Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 11:43
Static task
static1
Behavioral task
behavioral1
Sample
4186d46ac16bf2e46e6e5ac5fef3e31b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4186d46ac16bf2e46e6e5ac5fef3e31b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4186d46ac16bf2e46e6e5ac5fef3e31b_JaffaCakes118.html
-
Size
32KB
-
MD5
4186d46ac16bf2e46e6e5ac5fef3e31b
-
SHA1
5a9534bf25bc62f834c8619f6c0d71a135f0ec8c
-
SHA256
d59c922b229f40022ecfd57162fad34869a508e72dc5f1be15d099b6d596ce77
-
SHA512
38aea090fb78f189095f517b96726fad9dd2c2fbda0151c3290347850814e384a90991a1df7577a29ca20a32427ae63784556f01e6f69609add7ca114c5fe097
-
SSDEEP
768:Zcd9QZBC7mOdMw3pC5I9nC4DqG6w3wkwU4TQPd:gQZBCCOd30IxCyqlw3wkwHTQPd
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0314de919d5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{13B19481-410D-11EF-BAAC-CEBD2182E735} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427032857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000946db87359a765ec775bb4d3f033bbaa507f20fa849c0c97a3ee48099218c3da000000000e80000000020000200000000eb53a1347cb4dc2c732def2d61fc5fd7001a9a0a42cd91adb3a74af4362060720000000902feff4ec46d4b6b24415a795d001796bc1b6b379168be90ebc2e035467d05b40000000ff4040dbd2ae4fd002d877e0fb72fd7b212c8d58cce6eb703b41c5e8573ca4c85073115ea498f18f8c7541c4abd238336fcc324426e03c9c0fef790173e3b792 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1944 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1944 iexplore.exe 1944 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2848 1944 iexplore.exe 30 PID 1944 wrote to memory of 2848 1944 iexplore.exe 30 PID 1944 wrote to memory of 2848 1944 iexplore.exe 30 PID 1944 wrote to memory of 2848 1944 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4186d46ac16bf2e46e6e5ac5fef3e31b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1944 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD559e5da530886492e1bddfbfc6f384bcd
SHA1dac4ad7b4d5608dde4248e75af1e741d499bebce
SHA2566ed650b4cd246ee1aeabb26830222d049ab26e6165ce7d39e93d3346a0991b89
SHA512c3377f73c1840895c7dea50fb09d41998631c7d995f3a192b6aa53b2d87947ca6cea7ecafa1c0c501ee63543121b3986221201db9c340b269045ef1ac5269f99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd583d987e361b9319c540d6784a9193
SHA1bebaaf63fa931f2016056d00966e2c8c7c54c3d8
SHA2563bf926ecc2a3c048b8b673cbfde6ebd03f42daeb3236c6f0d75340c589b4d964
SHA51211b07d9df6992076a95d32264135c2796fdc6fa4cb0712661037d00f9909626ec3f97cc1ef095bf2c47503f51afdd374a55d5c74bbfcd1840497b660b0e45de3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fab3656c240fdd7c73e6dc9c94e6fb89
SHA13d316820a416cbd62e6cc08ccd1f8653d95ae222
SHA256b3787ad9261a014ce70844f664df6c6a210143c60577e953b38c2d0a936e443b
SHA512e873c469cb0284f5390e2cebacb1078844202b7f8e6a7b2bf90f66453ae87326dbbfd1f60393084bc8327368b0fc9c1927a2b12e4a9500f3cfa985fbe973018a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD567ab0f8d1f64fefe74bb6292aa47e1d6
SHA11029690ae0faf712f993c308f94d63db9399d367
SHA2569f1d6d2f2db0c54c321eab11a352fb721b5aa09933596739b28b3f175c4dbd6a
SHA5124957175e4c7c3a946acbeb5c925698729f5828e62cd3fd41e2523bfdbc573d8ecaf23dcc0302785458347d00f2424050343a0429116abe29f8cb39f34518b750
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db47870fde8ba11023c474e21c39e575
SHA1e6470c4135e933ebc96a4f80475edacf78a2ad8d
SHA256eb66fc1776569d9cba8ec0b0ae14432d61182927d30b1dfb3d71d30fa8216ed6
SHA512eb98d55ae40419e3d59c9c36799342364af9673e64272380b325bb32dbbe0941c8aadf12d8c306425e9997c90cdb25ea0debb3fa2c5b14750b7e01be1b30afc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ada892211b14bda950393d5df85aceee
SHA1597d80ac63be6ae92c9183836937708f99f51cf6
SHA256aa5b697b9d35fb21b068c1dce6565aaf3abd48282f351fcab80b17e74536a6a0
SHA512c22f215230c7ff245631c6320f6a38f3a196d45b44957661318f6d609d069b5e679d6b9c0bce09a8e5fbb522c5592e405467ec1bffb86008969b84a963127aa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57464cc1f7cd84b7b273c4f435ab8d016
SHA1f72dcade0b15c83663ec66024ef81ee7398a6458
SHA256ef7d698156c9bbd482ed10aaea55f503590089cb7d1a3ed0088f5dd97a0027c5
SHA512db2e92f468d5bc66d94f37f455bb587cd59634ffcd9a2951f97eb325472e4ae13c67052bf00a5257074e4c995cc1e5862a7caaf0f838d2ff75fc2b45639bb8c3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD509f09c5d2b348f3d2b8d3a0f4b41aca8
SHA1761969b1c9b605e3eccacaa5327704ffa0aca92a
SHA25606848b2fc8e44d21af59bda4d8622fbc14fea34182567f8d8a96d245b701c43f
SHA512c1c77b4182e1af3d0064cafd8214366c30e461d4e337b219d7b2c1410f7971e6bd10f6f05b9aa55a69db487b18e8da7e86d8e7e99f8119501e67da6ae56ef198
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD529fb37063ccf7d6e2e16886a82f5467b
SHA1390305a222ab2c51005ae63673db25abbed7c88e
SHA25699505b515fd35e6c1e2e6aa5e2bda45252cfb54e0ea70542289c8280047e3b6e
SHA51203443f4fc39c15ad62b7c6892860f5432809069d3b2f4b15ebfbf6b0eb86955c3ce80d72a012e670fd3336eace39a50b271cd4b4fb64297d336643e06f99a4ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff6cf5c8f708a710e594585d279aceee
SHA1618dd3e6e458f124ab7650f51f1007f72e4bf79e
SHA256d86004552e7b6bc9b4ecba85084e59f11c8b06f4385e410edd3becc6bfc57a6c
SHA512d55038d459c0334571bf175e7a096583d2322b00158d35404aabca9a84597ebb94b2e22157345f50e31fe3000178f3765844876e211ba294570e706cb02e51ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56f0087647c098fc4bc4b0e18fbc33531
SHA18059993816db88226970ae6cb991612515fdf72a
SHA25686b19ed6cf4aaeb131ff827feb2b70faec8bdd80cf4f8e269feb05ca3695453e
SHA512e19d6f5353f30e4830b44d8dbb4d7312d236007293eac457a936a223c91c2028647b38a1e19d5404064385222bf31c0a6450582190328946fcbae1b0e451519f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5baee4a92f5679050f09dce498e94557c
SHA11858481410e17ce0340a13a94b8925b9bdfa1746
SHA25685876a11907dc74ed9be70f4155e3768563a7cd291bd37f12e5e152dea782fcb
SHA512039b5dca6d8f281f160383e7fc9bae74c1c0eafbc57ece39d0f6b2d28926a09cd35ea6cb46811d99810ba6c10f4ad06a5b6d2cfaf65f6694d136e30af76efc1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55bf1788606bbd530b1ff2b24bd451b0a
SHA1e9d6cc03e04c439cc5dbd6bb1cfe1e13bd0f5b4a
SHA2568e3d6e2950ffbdeafc63232762acdbc5399d38821de675cd9c707009e13a5a91
SHA51266a0431831aa4f83d892b76a3ca34c484ad51b8e5d1a85d7d7c9cacf9a6e5b80e9fae3738e250977254e9a49e6b549cd7a759bcc8ca8c470bb80b0f49bbdc5a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55f90563b104baa0667179b92ecd90bb6
SHA1b45df4d02e63803d7813685b26a051b455fe94f1
SHA256383ec7a7f37ccc71226f85373dc723a822b2138ac3d1531f839d41095753e0f4
SHA512ac22a96e173d887652ef158e6c4efc0e6cd263c2023f71ad8b29aabd4c8b8dec497fc9a59eb9964a939f134c8ee8d2ea0dfdcdfc53f52ce5e6bb564a9edf2d0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b8c8c0ac1730b19dfc88298c00bdfc54
SHA1041a1285703820e78bd0a85a982f43b2259a7b01
SHA256c4729cdb691b63cb058ae7f21c2542ea9f7534f9b4aa34cc1d7c9759382d9c23
SHA512603c7ac3559f9c0e1f2e79041ec27839adba201bfc48a21805bae8fd466f313f16ebd072fe2e73c0c4b62aac688b94fa242381d2f0ad9a924e403637f2fc2697
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD584012092a250d90982e0fcbea65721ef
SHA18533ed2a0d8af55d9b90ff9097ad5956e4e3ad34
SHA256f704f8f6e7efafad9bdd761494c30d670e3ed3b768174b6a7e730aee25d87a87
SHA512591aad819639d11d7738ffae3410800e7bfdfb0fce435839d9d98701c22f359a2c6ac377406c72df61693a3d330c52e5f3dc6316a9219d8291035341f4925b40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d6e986537afedc39c2c2e14196d3abb7
SHA13581340279fe214ccc422826b913f3a71506160a
SHA2561337354820632e5bec743c5cc74fff75f10be57d1a64e87aa17c43783c327a7c
SHA512efc738b5541a937d7d5a8d11696b8fa37d2454976f012ba2163e10897f397fedfc890091189941a16510a89d19dbbc75b1c4c49fa3e652c7b901ec31c6400bab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c076281a274ace40628116f04667b9c0
SHA1593e186f86e0824fb42d6a0b2485182da356098c
SHA2569048c34f4c9c2a98a324e465cba38cc543cd9d2d8c050d49a74ce111e50863f1
SHA512334d9848c79a373fa1560ae35913724e31eba9f40f44f8e6cfe263bb39326cfb6f2c56e5bd16a280d36dc502a08f56cd5891dbced0dfb4d07b71a970a483f612
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bf7f8c158b3520ce75ed2c124f69ad08
SHA1846526fd887dc6d035b94b794a212489c6a129a8
SHA256058ef92025305929e4327c2f74830f6540c6932ed1db69f27415361e4e041ee4
SHA51256d8186ce1dbf1a8eaae92e4f55ac01b0c8073500c2f3536ef8bcdf53b65d7f8b86737df1f6d75a096bda93df7142a1ce9be8c4692907964757593003272ad48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD581d662935ac3ec748a5791594f075673
SHA1eb813a145a74eb4644206349e9e3962de0e16232
SHA25628fa98c727ada3d9719d2b6838f84d3b92c09d749b5f6f7007e016ff99554d0b
SHA512e6818899fafb67a61fac50b85f35d8fa23636a02dd1f073ba184e46acb77b999ed4c264a679ca9d330d821c4c24fd009ae04909908e5b8220acfcd6d89548466
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b