Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 00:24
Static task
static1
Behavioral task
behavioral1
Sample
b5f22b59bc7d7c727865a8050ff9a550_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b5f22b59bc7d7c727865a8050ff9a550_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b5f22b59bc7d7c727865a8050ff9a550_JaffaCakes118.html
-
Size
462KB
-
MD5
b5f22b59bc7d7c727865a8050ff9a550
-
SHA1
e4e6f85b2cef70695eac0e18f28ec850571e2bf7
-
SHA256
8a1babab1afdfd76425d3169c32749fea060ec3847630898b8e76fcd4dbbb31d
-
SHA512
eb04e7aef4a106703aa14378c46b98304c401a245a841eb63ef28dfb1418d2a54f93c181459cb307fdd15c56de51c901e05291b7912d528f828ea5706d83db02
-
SSDEEP
6144:SgsMYod+X3oI+Yh0QysMYod+X3oI+Y5sMYod+X3oI+YLsMYod+X3oI+YQ:f5d+X3jM5d+X335d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424745762" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007d778f0575af6a478563f1077ac879fc00000000020000000000106600000001000020000000f3ad290d3b77c7efce0d70a73a1169368147737864e94b868dd29ff8148714a5000000000e8000000002000020000000f4d71c2a11fabcd4fc2624903cc78dd950afc2c8502a00b3f396256a433a59d720000000fb90a88bf98429059d33b45a52de79b1298c8ecc00f9ef441fbb8bd084aacc0740000000bed19f24c7f509c5c358cd3427162393eddd953987e7cf3d6b78b85170ecf81372aeef2d16c9c29be9d0b66c5f7c662880d548bb6f4b17e0a818b9b5e4f65b8b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9043fbdd4cc0da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{057576C1-2C40-11EF-831B-46E11F8BECEB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3036 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 iexplore.exe 3036 iexplore.exe 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE 2904 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2904 3036 iexplore.exe 28 PID 3036 wrote to memory of 2904 3036 iexplore.exe 28 PID 3036 wrote to memory of 2904 3036 iexplore.exe 28 PID 3036 wrote to memory of 2904 3036 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b5f22b59bc7d7c727865a8050ff9a550_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3036 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2854b13bcbf4778976b681cafc4047e
SHA116766374042e6573f46896458992ebcb299cdbc8
SHA256ec653361ef04cd8914fa650e56782679b7e196f7ebb69075d7d4e7b481d6337b
SHA51285ae77fbc1ac8fe8b00edb35b503d97e0cc40bd0fb6df95b56ff7690b119eddeb307f7a95a4bc7a4a104ba715ad15b245756d1364e425d88dce1773b0b071429
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547d4b413d684add135341e97a8136d7e
SHA125ef0afc625d1226f63dfc1c22d6027302717c1a
SHA2565f69e44572c842a28171e7ed2a68f64f585859f9e0872b602fd96e9c71ed5592
SHA512811f49e0bcc7c1b0a93893a8c93782512880a22650fb47687b7a601c4cb3fc6eeb71bf8afc416116a850ccf687d69ef0e664ed4215e2bd6791e5c792a9f44cbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504a8cc7ab1af64d99360224e73a318b4
SHA18f5626ba595c63ae20eb35953b7d2c0d4ec0ffb1
SHA256f3731253afaa0f776bec652cb3eae584f81f16a6efb4ffa0648844f81772a1f2
SHA51200a3b9baec979cc872bb29827c4f81149b5cad961d40944025b833c1e7c9c85a238543d5c839de161204c7d0b43d3dd2112d6c82cb52d60ad13b864512ca560f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c04aeab046fab60d74d33ba511d1410d
SHA1292fc7b63af5beb0f0c39dbefb7ed0ece40654af
SHA25603b7be775016d12213a85369b89b3048ab085f9b672063f8df1723695fd4492b
SHA51226f59ab0e84435ef8a47fa542cdeee0734ac08b50673e87ac54b81947f9a9505a22c0e8e2d875b8c854ec10dc9b762dd0d1c50a4efc943aecd7f28dbf1ee9412
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d18b7e88985c03071eefdbdab894e25f
SHA179afc0e313dc7422956995c8b5a2c9454105f7e0
SHA256314ab7ba41ac6f85ba4feabbae81b396820c0af5f93529453d7d52e5f043da4d
SHA5128c5c8fc02acd9abceb783b1b2542291afe83b16e53af800265a67c6b6a8eaa5697fb1a232f8ba6beebd3c9b27b227db70a6c47dcf9eedd6adb60488a8b99a58f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5019ef7f294ea517e6d903cf196bd919b
SHA1301dee4b592afa00b752b2b2c5bdfe7788c4b938
SHA2561a222d989df66d6b394522262212c8cf9f3bd95869b4222c3e97376dd6a54fdd
SHA512a0dd96a2fa649b470ffa965b65b20615acb38d4389a6708fda1269271624d776a769040304312a803cbbe0ce0ddec342ff99f42145527a29373e30819f10b42a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd99c6326bc88d38233f1666889a9f9b
SHA1975af1197bc56c5a0d4f55a4c1efce4737e9c9c2
SHA256e14e12397b52d68b633939c861f808b3bf8c3bca0d98949244800acd78fd6763
SHA512f32bbbfcaa516d8d71495808eee01f4f72dd416b0eda70a1eb3419a60729a72f5539729084211c6c59d1cf70449df35db2af0b6b51e5912b6e96e0964acf645c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024714c55258b111463ca0e62ee7968e
SHA1c711208de69ac9dc97a0228fb2be4a9ff690731e
SHA2561477b592b4a8c0e6c64608dd6ab7e0b6431f6facfe6c2da6c8a7d506de52a6d4
SHA512c4a89d25241e079503524d66cf0c7fa4534a309a1b7918ba4e22e28f135cb8c13b175de98ef8eee06782122a499c98d3f0fe2f4a01a7650135cfafffe11fe30e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f84c7c2423750de9cd7c58fbd1386c1d
SHA13a1015d09ad5f6738dfef16494311ceebdb69775
SHA256ae3150d38108b4f4b4deb241c46a754147d5eca647639c67e96378912856bf7a
SHA512d5ea6a35fe92bc8ee7562abfb6666c56b10ffa64ccf526e90affe81373e45ab37a02afa5aba0d43ed616ab5923aadac72fbdbfc4f03535b32466577a9f338520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5202badcc918123c9f69dc69d93d60184
SHA1a53ee32f5ff72dd34a7cc314596b685a22140f71
SHA25673af29d72b231b38d3368dceac7e392c01c62d33e35a851c2f9fa82e9138ab74
SHA512b54fe9ad711a81d1b45acdfea1b117161c46fd3fe7c9dd1721e1b82d26fd6141bffe5c703a8e28384792c9dd67332b127eab66265cb2ae64ea4ae02053e49ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2ecf99500f2132df058767c332d0734
SHA1cc32ea112f87f8eda99bcb365e995909ac41a89a
SHA256a40a14f8866b44702704897b94e075d486cdf9fb4767092b5d5d2cb5976d6b76
SHA5124dfea9f5d234bf727e9c9ade72615f041a9cf50a6a372fc0f569dc05d5a5b33b7e21cc52dcf992bece3a9b744226ec8005e25e87341fa92a64d7f881b3f7b057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcdac66b0fdd3b42031f8833e86ebee8
SHA111e82193c183c1ceb0727295887cb689921fe9c3
SHA2564846f6370039a1185db20512468cc866582b70fd7583aa5917f4da3615c70e95
SHA51230e5b45c32f75d18bf157a3da217ad033c174ec677451edeb7aa252229ed1b1cc4e35f13dc2adb9971825af88d452b77bda3b0142a3b044019cb0ef6f291714a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f27be594d066f0ec30d53d07ec3575a4
SHA1b0cb0cfc10e087534b3eb447a67889cff418b3df
SHA2569b14ab2bfbc7ccc7276b93affae3548cec344d926dc1c9802d4f4ccf50c601c7
SHA512dae4441d88e3af42a50c06fdb4c07c7736b490b5d28a2bc4fd7fc4909f3992168b671c9063ff44f714baabc19a3c81e1e5fc6bbb2615a97c9139f4a69696803e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53acc32a5cfe55e6390ebd4cbf4fa3e4f
SHA161385a43dab23a4d0827460b09b1aafc49b04489
SHA256326c0dd032ad1cd4571251e3a027cc779d34055dc603e9ccf7a394e5e1837bab
SHA512805e1218b3adfd50013d4ae4ca5fdf9559ee60c5ff09f2fbda0e3e38a8a6c2156ffddfe1288feb9f2d102585c97788bb1c1e84f1a8b8922cce10b2f121dcee89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c704a6231171711b853eaee4211ddfda
SHA12abe67b8971eacc53fc05fe4f49593631b3ca7ca
SHA2567bcbdcde661c62de1bb08f4297b501220d64461586cf91b70731101cf5370fbc
SHA512fc23976ad92fdbb2d3d7065de3de762b63151ebcf403d5b3fca05fad13926fd3e20f13ca017fd805b5c939233fc873c5c1e5a3bde0036cb8a3981bf11ec37ff3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc56b4ed3864ebf1e19fc740217e0d10
SHA1650c56868da0b712a9afabbd778810dba86f18fe
SHA256565ca6f7d8bc309049ff55eae57677ebdb5b0589306e3065ae3b0167ac84da53
SHA512f035909eb8fe30a2a4d1f53fef900d85b100863596584fe4b92d749d8d07d711a3f35b67abee8fc81550da1039706e23c6f3d570f665ebcf32d8c6cf892c75cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5349518369636576ef227003ce7817ff6
SHA1d23c536010e63b878f85dc9945c3e38c0d7a7b64
SHA2568bf6530bed9fe2648260e04c42362221a98d7e8d1fae4a0d682c001724fdb62c
SHA512b3467b056b57896d7c95327dc19e81b7436ec04f7458ac2d90d6e701a870847eb9b3fa36faaddc527d9d09e7b2af6f5b2fab3884cf58a745105336d6f411f9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50f6a0f39d655321458b439bf40e7ef26
SHA1c26d19ecd7ea9e5c2340e9453d8facb172befc79
SHA256ab2264450a3b75059c5cca8a9c0f12b8b5b77e6c7365215e02957d88f8999f8d
SHA5121097c4ae0c3fb0687075c9882c2ecc36abfc904493df95ec30dedce5d5df96ae41881ebfa98bf67916749a73a710ab09284d12d505eeb99b86b66ce4518eb295
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4bcc74a8e1c972b27978481df2c9f93
SHA19e4a105e4422e8d71e4230407fad0f14ba520d32
SHA2562c4b6f6b14ba623bc5e8f4bbb236c4bca2a8eb7acc5bbd2307ed8f838c84a576
SHA512d8d35b51dc4b07f91b3c8ec4d986bab263da55946715f71560d49e8d6d450a18ca149bb38d4acc9e9292d95a88e494a705d6ad9bcfa6977f597352b26bc021ca
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b