Analysis
-
max time kernel
69s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
4596313facf9c85b8a0b1f100101b4a3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4596313facf9c85b8a0b1f100101b4a3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4596313facf9c85b8a0b1f100101b4a3_JaffaCakes118.html
-
Size
12KB
-
MD5
4596313facf9c85b8a0b1f100101b4a3
-
SHA1
2e339f1d64b62f8d2bf7ce89dfbeed3623eda0ad
-
SHA256
48d0a319807675f0d6d6239e90fb959267d2932fb92b4fd9480890ceded554b5
-
SHA512
c2eb1e39e0b7ced03748285043ea4db6e9065a4af1025640e44fe07aefcb832042a38ce7cb94dc01048983ee1fc649671393d2e7383fd2c24f2b2fc47ccadd6e
-
SSDEEP
192:AHNPyRL51WzVkR5kInwM8eYCJIfZHm5yrPM:AE1WzVkR5XnOxHm5yrPM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000d129e8aa6e813e1267a604c1910e759af2711636e32876cb5de69a3282006b11000000000e800000000200002000000059f901a70324dca9d250214431402ee2d4d9fa433089c5abdadd4870fb13325e2000000064a97e17429253fc9045ef34f9d171e44957325819f363f58fc3a63a017209a640000000b9782d2aaffe37c6e4c99cdaafa5ff3aa9c9f812715454ddd8d6dddb985a28188268b040754d3f6cc6684683ecd3495321effc7e329638a11f6779698810cd4b iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90fc4ad7dfd5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{023279B1-41D3-11EF-A251-667598992E52} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427117870" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1900 iexplore.exe 1900 iexplore.exe 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE 2788 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2788 1900 iexplore.exe 30 PID 1900 wrote to memory of 2788 1900 iexplore.exe 30 PID 1900 wrote to memory of 2788 1900 iexplore.exe 30 PID 1900 wrote to memory of 2788 1900 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4596313facf9c85b8a0b1f100101b4a3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1900 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c4a69ca314840b756bc7a986501025b
SHA144adbd0265f03c93e8b751576d39d7f9935563a6
SHA256de89fa14e8c064a16e72635f4e3bb2e4af7debc71f4f4e903fb51090d76d4375
SHA51284ed97b61447924f18fc6807160c59cf71233d1db2ec1ab67d8f22fe1b71f358c240ec3121a5c11fb4d4355e8f730e706f4025cf2c01ece1a38e0ae2752c441d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542a0fbe378c22bffe6370ca02fa8f94a
SHA118d1dd2ba118a94b32f0c50dc6aedd2868812b7f
SHA2561ac4bf96416e8d5c65e8afea12cda8b8fd3bcdcf65f0fb158476e22b0554b184
SHA512f9b98c43a512301c49fdac1c01492516d65c5640d44389fd1f77cb3bbe29c6b3f3604862b081b189e84571b850e7842d5695faf039fedb0bc7b888da7599c63f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16342d321333b79a8931dc0a784223f
SHA17d7d535f2f635d11641df681f4d91b7db142c907
SHA256d24bf38163178550868d4bb4e6a70508022adcbf75b8af356cd11826fafa464d
SHA5128afa2ae0fba26ede3a82417c64d385bb90b0f874c31e111c898c18f70c316f5dc10f6a13facf599e56c68c5d2c357b445ca43c2ad3ca8a90e6a9026a5051eceb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599c35b7264526b3dfcd7111a0b36bc20
SHA1e8f0b8ac72a452de7e88cfd7a9c67e6c85fae98e
SHA256e103d443a644ecf7296cadb8d37d268ffa09e1ba0ab1674ff055e0ca74391797
SHA5120cf0897b72e23a0dd047c2150f52d58de87527c3646147aa28aceecb9d27bd35f77de08bbf187b3a30ba047658f6dba093f52ee724827e409e7c432756ddecae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51738b5e21c61b353cedb07329f6f1740
SHA1061a1815f3c0e14884ed579279e8946204a43a6a
SHA256aac8a8e53ec64bf417ce140eb373191e50d4d8a4ef9770afb8c0b8d18a6999cc
SHA512cd96902f8ca140705b61d12bd8571236edbc00cc329fed1b8b51b5559055f0b471e17229f0a0d99f315fbf6b1ecd4e2d0aa5c2ce3b22caabdd5da2e8ee2c62d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4fc65a31dd0cdf22eb54c30736f0b75
SHA1aa601d8d0dfab562aaf34263606c08c1c2261c83
SHA256b786d9ebf721700fa47c9ce2fd50d82a6b2b36eb1246b315b5815e04db6eab31
SHA512c7a084c564a67496ca73fbe005086ab53e696a94f0298eaf406e400f1638563b1463294c61387d2e2cd9a57dce581b8f77b0a191814d4a38035a5b1af4cb4fd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fef52fe10da5ebaba16c004e5b29fd84
SHA11b3ae11119676de96e3d69ddcd1ed0ea8560edf9
SHA256a45cb382a3dd7e4466ff207ac664261c99c835cd378b337ac35c8052e1742d0a
SHA512128e5a5370c472f743f25965fa4e2bce344c34a56915d6274fff0e241275664055e82596150bff082285b577ab958af87e05809d4511f15220d2f633a6c9ac50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e16a39f3cb91482902ea6148bfc61ff
SHA141c4dfd496c738228bd3fb17c904a1ea524ec020
SHA2569aa65406597e7141d5da70536bea1f3571673312a536f4de75311d609d076ef4
SHA51245b20db33cbb7d0214eda1b2ae2dcb5a0a0388e09e7323c6e8f919536c57eb142e14cb5aed560051d3ef127a99f5ea443b8e7f2e98b6159ae48dc3146715831e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5541d8343bb67ddaccff802e86ecf348f
SHA14489f0857965a8b3760650b39fa3339929214ac1
SHA25613c86627277cfceab77b314b5318e91881716521624b9bf14332dd11ad2f92ee
SHA5124f3adfe1590ec8bb63fd6fa281ed19bc0b59d58b30850834b74c29570b2a3c35422f1ef411673b1a0353ffbc0057affe7cd3c1aae638235a95496b6664f1d963
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d5966346d18a863cb3188318bf0b37be
SHA1b97be08fc15cfd9c8c819c24abf20c2f48cce378
SHA2563c48bca8f6e464f097c0590898f809670313a49416eff0bbf0d193ef75ab2f9f
SHA512cdb0a04cf64e582c3461a3469443bb3228fea58c13ed46bd93157ba40601dd81434bc44102fdccc9fefc5ba8df4caabb235176654393a6d58c745a545c6993be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef1bd05b6d42eb59a826edc686917efc
SHA12ca0c320e7ec210a35f7a7eb364c5d0557e5f9af
SHA256b13d80ed65882909ec6ab5ea26a96ab0a31633fe3cc6fc38b399353af2e32acc
SHA512540428c2f1260b62eee79821c0044a9ceb76387cd4ec8a20388d13c54712fc1bf5dbcabf5ff43e567f4fb5ba1d6b39d2000586e10fb1659960dd600bfe165595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2366106379469039db1b5d92ebb4079
SHA182b2838747e8d5f7b8a01e04ca64540163ca9916
SHA256c2a2b59586eaddb136e682762aa6281376246864bbd980a5b5e2fd9f02c32731
SHA512fe625a5b5fa6b57ae626af3edcaed9257f1e3d2213ab54c4025c3f4c5061b9bd47c62b2017d383544be7f79b28f2ffef355d3c3ff809d6c2e2f77488c328fbc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5699b82896a5c1be5af5ccd6d7304999f
SHA12dfc13cd7aa2a5b21a116a29ce836cdb4b10c011
SHA256d51b9f0f0d2bc6f4fe9d9a8966c4f5f6a20d6a0f4e2fee1397ffc9ac69a07d54
SHA512ce3de7b1b1fee3c60e7643372fdf5ab477df0d14aa9b0e7df07e22c58261867af27f51f27dd34b7db3cbfd763134368ea0869870c4f00f05fb759b8fd5477d75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53548e49dd912d8f15a8cf88348fc628e
SHA1bf7b14f4bd39317a0135efd9f837951c294f837e
SHA2563df23a2b40961f68f69d9358a7664901f37562fccb31585954575276d3e1f458
SHA5127a922bc66f5dd11cae894d942559227fda3f4caf003be1cc13754cc5e3b008d695a80065057be298a7dc450be1d247190ad0688a1ae4c6b9705cb380b77d9b4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c6fc48f61a3c2df7f4d19a8fe2ca0d3c
SHA1ad2687038680d587245863597f47fc7bc803f89f
SHA25677ef213c50ffa489dd3d74eb86b48baa86c2815e8304a6f95682ba3720372560
SHA512808922f389ce1281db41011c7721776ee1563b8c1c77e427ac3c884c98a7392a0ac1b9805da7e65ebb744967f8df6f9ef5d7829dabfbf1ea9405367abe7a8dda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ae1360ef2d9c2bab8aaa5c7925bcd35
SHA122c927feaefff5e1afc029726ffb9def32733ef1
SHA2565e15b8af25d7a96cc6633ac2be930c8499b21beae0731637d68eb10fd2b885f4
SHA5122ddc45a6fdbc098139d54682d494c19c744fd8b0118b2d6868fdb9c7d41860f2facc28e8a0373ffdd16072198beb5a7f80a9e834a9d990a76467ffa5e5fd62e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5777340f729f6b5d7f349294c93912b17
SHA1850bea140c78ffaa8c4cb7c09f74932922e3f283
SHA25602b8272e9e07a38c21f39ddd2ce4ba33034bb5a91ba094133b1decb7b21aa2a9
SHA512468ea9e531632269932f92544b914aa9ef316e3b2227e7997db7c68c8cc6a2a42aa965334af3350edec703c143b2c8574376605255ccd8ba7a9c538e852b2f50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0daef8f6fc7b9f10cf7510be0e1873a
SHA1f6758beb8cf1bbb09d84e1448bafac67c2eeada2
SHA25694d3092af478bbc9c1b815d5136cb1cc53a45e9c5525314e90d12f523d8b302d
SHA512697107c1244171ba8df1850a44fa3f68447931c0d5ab8136440814c07f442ce9797f30298bd99920c34ff83cc3cc0bd4f08d9d5c5e146902147fba77b1522a4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3ebed2ca4fb504e64447fb7ed485aa
SHA13a6bb8bd017e5d58f53ca3af843c3d8bc1209671
SHA256db4cc5d62bfa8a8b02de064289b30bfe251c944de8272d706d13d08b4d57bfb8
SHA512a60c8f454ac140baab5b8df751268a47be02a790b6100952839041f9dba178a24208ad91bcd57d155132465450948a26f9a80eaae4966988a1c860f41e25d430
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b