Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
047c4bb6ea66ae1ce7e33c3b98ea6829_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
047c4bb6ea66ae1ce7e33c3b98ea6829_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
047c4bb6ea66ae1ce7e33c3b98ea6829_JaffaCakes118.html
-
Size
19KB
-
MD5
047c4bb6ea66ae1ce7e33c3b98ea6829
-
SHA1
999a3123828ce4622b18d074a8880e6bfeb2cb33
-
SHA256
5f568280928e899a70640e46be1fef6f6790ae8afb83148d60eb861ce044571e
-
SHA512
eef1a52387fa70c67f010e7e3af1f5df2f7c164430a2cc5fe36da446f385c5af78de21ee6967dd325ef71460f78d4b8f026108996ae0798f1df53380ea02331f
-
SSDEEP
384:phFwHZaPRagQ4pAS9qgtgcVfrXK132mORagQ4pAS9qgtgcVfrXK132mu:3zQqFbXrXK1Gm+QqFbXrXK1Gmu
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5EFDF151-2EE2-11EF-9DB4-7A4B76010719} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000002bc26017579bb8b3be80fd23672e5132b99a47e44f6e29953e22de681c0770ce000000000e80000000020000200000003fa8fb20ed7431cec242fce5c26895543b34933fdf07cd3a01430e2921816f962000000049a7ccd220fca05a93603304ad9051ce41450125ede4a7e01074e23f3d4a596e400000000d316d6bbcf52c7ca311d3568d0dfe50a3c628e58449f96719ffed08717a5d9736aea5694b91886c612a91d9d14af94b5f81567706d8accd65b12e1d8794f82f iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10577c33efc2da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425035393" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2080 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2080 iexplore.exe 2080 iexplore.exe 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE 2928 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2928 2080 iexplore.exe 28 PID 2080 wrote to memory of 2928 2080 iexplore.exe 28 PID 2080 wrote to memory of 2928 2080 iexplore.exe 28 PID 2080 wrote to memory of 2928 2080 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\047c4bb6ea66ae1ce7e33c3b98ea6829_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2080 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb8a01500796132bc9ff572beb81959d
SHA1762ef4a98329c98e83a517ece5c502fefc20b0d7
SHA2564832b020f699c42fe83c89f81897dd3b940c91aa2db0427437b6eccf7642552c
SHA512273c99f4158d306f96e2e6553c94a1d017632c7e39d78c1507bd228a617be2672e3edecef9d00a503236de6315c1ed147e17c476e44e46e0c0824fcffa617096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503440da0264cd2317ff91031684ba1d6
SHA19df24ace5a75c3111b7fa8249d97d9464c2a5bb9
SHA256ca2f6aa3339072d943855ddb4b991e4ee7a9a845ffcb0be0e0c9d1265b462747
SHA51234cc42e87f0cd8b688bd42f75c1a61197e7cdf29b962ff8addfe06a2eaf019813524294c1046f154a543e7330d8b317a37f9a5cb5e7542b6cb54e161a8593d17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee5f1206e1b6de9018e835ac6d86d1c1
SHA1bd7be69eedd6641d851437eb6facf5f92b75b175
SHA2560094bd80ac2ff7016dad99ad985ca1ac6f10202e32f08874d293591693bdccc9
SHA512cad1925bfe78fd7d0dcf2352bc0ebdffdea23e9ecfad685971603cb6afa62894030bcadeb26cf8d2a6a3b5bce6e1f57e0471dba37249bc1fc1543707b26412cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57719c37ae57bf6f129165eb642e5380b
SHA1d77bc0d6c955dd13ab67308620b3312c3269834d
SHA2564f9d9b7831fd52c48351ff1e6ac915ce4ccdf1a8f23f3f4a73e84a07c658c027
SHA512942630dcfe19b2e8b634d83238973434eacd9bc13228bd80c758ec077b01bac309efe71bf5cad86dcb39ac3c7e0382f4d5cda7edff9cfb335992fca4a069afe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529ee14bfbf12f344c483d8a646254a16
SHA13373fcec62d00ddbf751365b254fb2af6fb4e170
SHA256075d34676f3cb350e2ad84c6fab53791d4bb78712bd72c978a710c69d537dd50
SHA512ea825461f5480c265c22925f7c25f66d605bc34d127a5d135772cb8336092ef03511d179594562cea22033255e5ba5315325f8109395977754cfc0dc5413576d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac53a04b187b0a454ab307b15c388a98
SHA1424e430be7b8493efdb58c469ec8b8b5e141dcdf
SHA25638c58002c0222b453cbb489f33d5bda4388e312172335d6efe027ef2120c6bc5
SHA5127be7952a838a48e8a3432c9180c54290552246adb3315c4b687b987dbd1e25348cf0b8d2b3155ce8a961cbc5c59cc8483401548557bc8b823b08a49e9a6cb1d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544787c45e60c0d9b630ded0b31a280a3
SHA1854755fcb3e32afa7ad6fc12e7178639813fe5c7
SHA256e00d63529d03eaa84f35d3bc15f32dc8efd91cab32043409757d64f8b4d5ce19
SHA512b01391de32f1017200dad40cb0ceeac1346008d987d0423d4e05f1fe415fb262cf23bf5abc9b39bef9ed56eafaac9e46eebb6261dd62f52c421534b25e07707e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c17467bc9432236503716344341c5c4
SHA105206362d5524cbabc885a0a1b9318a7bc1df4b0
SHA25627b115c4d51ff787f799b44e68e40328d821c79070bfe70d225a2a15f2a52a26
SHA51277b96151c7e5d2100a3a775599ced13af24d8a933e42e0e91055afdc6a0d334e3065113c2b3eb02e0995694678ce5b6b2442bf7e0e2a2c861dd450acae17b61c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5572fb501506594d747bbf0496820587f
SHA1401e650ea1e2fa1c3661b49cd792642996e5db00
SHA256b4f54ba033af61048b02ee3cc2e31d2357df885d63a01b025b7f66f960503202
SHA5125e73e7ed1e6a7b3315531e152e3301de92948d196a827cdea4ac522d4c4bd96bd0c9a52550651addf1a00ebb062b7a54737e8f4fca8ae7e10b9a3eeb48514cd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5299e7532d49327a96d634329351180bb
SHA18a9567cc3fd5d6bdfa8b8aa474f87c9c63b611c8
SHA256e1df062fbaa3e63acdaf327a3420f5753299442dd395a4f08f993ad669440d40
SHA5123b6388c5970eb188c40d8977e6ed5e3f67eb8ae48baf1b5dddfd7e4caa7e658a347fa4b27a13185ade3f9940383dbfd1688e2b13bcb11e1fe0e69b13c1747a8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b7778fd8a966aa1d6a1bd9df42d4c19
SHA10e39e7c993416c5c9a197cbe273e7282f2127d24
SHA256aacf871a0c310878c447da0912a7ce118f803d7215420ea32c49feb9c2b3b869
SHA512e043ff520564ff3ade9b06e11c22e460bdce1c2143c191a2835b660d4cf73b4319f01b9d2fcbdfcb3c45c321b7344f12ef9573ce03b98136033a674e93cb11e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f572354914348825f6e08d1209692e15
SHA10f167bc268e58322465a3c46937f13ff926b47be
SHA256edd754105b82143d825dbd46c51d0f0c3a82fe8e9ccaf752e8c506611a91d608
SHA512016eb4823c48088a1c470900ab0554b42e2d9862f2392a82ae11bd35ed812adbf2fafaed2a263b601eecaa980657c9d5fad399520a28a3df0f8c7486d7b652f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7637af472b4312a6cbb785c4a98a8dc
SHA1219a9d3ee9f7645da59a29a64d925e4797bdcf9d
SHA2567fe3ead57a60ee0679e9150fa6e12579f231d587eec67384d8fa3e08b697cdf5
SHA512b91de05600504f6647f548b1679ebf0d590f9e10c8f3a97d2f95ed926ffe34ab6f19aee240e053ad25c1367e5f044e996c615c57af9f4da5565767c502e34e5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5f5600c7ba23b533fbae8f7acfc91a8
SHA18181b7b2d33a5996b30fe1b59bfe73be7eea9419
SHA256604e3ca8e265ff90d6dd13000d213f9bf8b6cefa6adaaa7e286aa304ae7f4266
SHA5122d1973a75537793e968645b9c837d1f5f0b4fc32f814cdb4cc0f1e90dde51ef7719d354eec99698be55d202493166c992be912e29817440dfa319f621f06cb9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564218db2570d204167566b223a4a1b27
SHA16bbcfdc56d6bd1c1162641bc59b3326e0082f279
SHA2569e5b81330392a31fcf81bd95fc0c49cbcb72929f605e032448ed2b3d33b44bde
SHA51276e87863adb2112e4c36489a0b77b76aed3b3310db3e6fd4cebe382f402dc6e039d9d7491599ef01dfe03c1894a267f1af014fef7b1a93153153f46c6bc9e3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de02ff4c6e67bc9a5888c16f394a55e3
SHA109790e03ff77dd3843abf99c65aa3ec602b132c5
SHA256b8d7f7070a094d4e9f14a211bafd0e766b78377fd092901ceb38c4b7b23b53b9
SHA512703d1881d30a5abdcd19a432c115588f46ccac2fe9075bf240fbb31430ec0a3e1eb10ea9f49250eb44c0a60a8c55321d1ff927e91b6e0914007d5e13e2d432ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b26f69a880e9c25929bd322a73df0f1
SHA1b377e4d4fd2ecd2c04855ec9687fbbe9051f1aef
SHA25628c7e4ac73799935e713dc880427a5f1b54d84fa7f174ffda0792634774514f4
SHA512fc3991b9b504dbcf0580f52d0f0d82e102eef56358300f208ba1ad9677813ba9562044133ce8b9bd90327fff3f79ddba53bf0f00e195fd44eec63f58085ad350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea23568fd800950e9186280bcf408560
SHA19fbda5c3173f795bd4b67f39022952e9a1614f0f
SHA256880cd1e2ef39e91b3ff28a880361a3f0f99caa2d1bbbc977c581346ff4b2bf3a
SHA5124a94e21b31de29aacd9e42fcd5bc4daaaff2b97bca0c36b431f401704eb9e384d8678aeefe9e47930de6b70153d9a4e298961d1cd2ed50175f1d90aa38e1c595
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b