Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
45fbbb622b0a443ccc4b7f699e6ac968_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
45fbbb622b0a443ccc4b7f699e6ac968_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
45fbbb622b0a443ccc4b7f699e6ac968_JaffaCakes118.html
-
Size
53KB
-
MD5
45fbbb622b0a443ccc4b7f699e6ac968
-
SHA1
d894e2d067d03a8dff6c13d77cbaae61a2ad712a
-
SHA256
1a0967a4be60c47f6ee83f9d450a5c1bbccd37cc9b5fcf3a2c6e724350a5c20f
-
SHA512
6acf1678bab6ddf06aedeb72c154a729936563d7f467c8bbe27ae369a72ea857ab6504a237958fe492b923d08c9712107760f822e7aeaeda262db57bb06537c7
-
SSDEEP
1536:CkgUiIakTqGivi+PyUMrunlYl63Nj+q5VyvR0w2AzTICbbGo2/t9M/dNwIUEDmDJ:CkgUiIakTqGivi+PyUMrunlYl63Nj+qL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{75E8BF81-41E3-11EF-99AF-7ED57E6FAC85} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2058f54ef0d5da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f00000000020000000000106600000001000020000000ff751e6d77aaf06b4aebf61ec5955565a78571c6dacb6d9ed05c66dd07c2a582000000000e8000000002000020000000952d084e0645c3e7dc5d7e7d52a13437ee57028b505d5a10f31e76b1665a6ac92000000082566812ae07f917d05a0a6964ff78e51d7f820351c28499e2cddfa9814970394000000067b161efc5cac23386131a9325cf1d49b061f626c4836f998c5ee889698d17539aac05fc21166400f37ee75fe6e191da24a6ecb2c972df9145d64512b823e5d7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427124934" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2124 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2124 iexplore.exe 2124 iexplore.exe 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE 2208 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2124 wrote to memory of 2208 2124 iexplore.exe 30 PID 2124 wrote to memory of 2208 2124 iexplore.exe 30 PID 2124 wrote to memory of 2208 2124 iexplore.exe 30 PID 2124 wrote to memory of 2208 2124 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\45fbbb622b0a443ccc4b7f699e6ac968_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5508da870ea73618a2356780d133e3e54
SHA161ca519e01ebbc4114cb368ff299e79c959469f5
SHA2568f5dd23aa826750f1ebbd6b5c9ac88a87159379b9a53a2c489bee5be397ec240
SHA512a6f0aafca767bc39c0587238f7ed1dde7690c2889407ad70cd4d24fe4ea020af0797b5557ce6945986cd933c16b43faa13c9ef65b1630aa945b7cb527f87e763
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d140de66226b471a046289585bee136b
SHA1c9aa54511c28cfc705b1f87c668195cef7982d7b
SHA2564014bb182cd6ec47f5291d8160742fe0fc063bb8eade6aa0cff2150b15a2f8a8
SHA5124608ccac76c4c624c7f750fb062184feb7f7657c27c95e36443ca61303bd46ef69a4574e71a1c42edb3e2dbd79ae4a3d485fff56705b2334044f4b88b8dc8757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c454aad8fd7c8eb5fada947ab60d442
SHA1afae48612aeeb008361ba35220f21d8a6737410b
SHA256b14ba84f70a4a5c5e0f5b09bb23dff42692a4643646c5b008fac86bb634c4e12
SHA5126441fac1419675f1c580a78cf9f4456e59bec46136862e5769beec18403e9bcfcfad0cc51004f9cc59e52263e3a502728003d233809406c26bbc0580de0f3fad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7aa620c9918818fa518ed9e304cbc61
SHA1c467cddec787c176a6dccddb7b4203b7a9e865da
SHA256df711b4ccefc4fbfd6d9f2b57714e25b9ada7610e92662930ab7ada7bbf9c2ca
SHA512a1ea6308caeb4b90b86fbcdb74ba5ccba95310d1197526894e378d8deb995711a689a313e2777b2629fa2c9477e9a87b1095bfd8c914e7326d06384514c245a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6632836b072b91014aaaa0937a27246
SHA13c8448a186c399ad0329988bb16d480fc9d486bf
SHA256dc16e51a9bd9b0b608be0e8c047ab8648b2d2e95dddf83b4384ee2fc483add27
SHA5129b26b9ed6e2522909b9368becf196d31fd353e49ae8c57062d9b4d7d992581934e52dcc4ab28531b84a2db150c51777e3a524005ee2aaa33292eb5cab6ab0d82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58efce62bafe06960eaefe6cc2ce36f6c
SHA13d8aa7c872a68286b23a620f593096880ac91a8a
SHA256d1b2f522b3ae43e6fd1432ab8ec81fbf089474aa39f89199eb7c0e5eb5fc5980
SHA512304cee3e5bb8fb4575eac52782c9a1c329eb42d40bb4ba032f3cb185dd7d75475370b2e8c1ec818ec19cd37a75df27288f864cf1e02b4bda740eb756009b86a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de420e3bfaa172b16a48b9a30c864726
SHA104a9f1112ea1fefa592d686b6267ec3b163ab101
SHA25627a52eb837ff610127faeb71143c4872d78752919917859af3ab61396c792064
SHA512780537684439a07fb7686b377821f4c5b535135b712ce74814a400d21d86afcd625bdb297e68f28b091b36ff6ebdfd1db4a37f24c7fe1c1fbe65bfc940e9e5a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5506f51ed2e59ccd7ef3df816ea42ed9d
SHA1d5103374aa02cdd0208b96a9a05b0aef8ec85b0e
SHA2564901f24ed7e31b40e38f82700679f7a03f8e9e274b2dd2dd0359ecc746101229
SHA512e1659d1f7cdb82d36bfb49c028542637c6d4475c560fd9aaa587cda624bdfe30977b0e4b1b84100f3bc8a5348f12bcad6a777ae40cf7017e6de12613b813b84b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a9c68fd3e9fd6bdcb4c9bf5436eb288
SHA1806dc7c12856e2cefcb40ff4b85ea5fb386c14df
SHA25606796360afd7dfdd8a81c1e7c172c8a71fc25672649e29c84ffaf2097c008c01
SHA5124d5b779f5e9b639c56bb29bda23f77b8c80d9e81aee85f972527e9f398d426cbc93781d437da2f4c6749aa98d702dddae977039cd346cd7926af628e9924fb7f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3cc05b8cadf9883ef5264209585b247
SHA11d0ba40aafb6be5f96f84f03f19e7b03c19ec22f
SHA256a79fce7b656a6910fb53a95b5717833d3031541ce8300a1df8bdde7e246386d0
SHA5129a75404a178c05e4af619ce4e298d9742d11afc2746674f4b4c818eb9316d426dd42abafa8774cf5fcb9ceb52183a6359dbf49eb0dcc705deccd99f5f81562fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590706696fcf2f0b0c5447aff675a1bb6
SHA17643057e60237573f5c5d86e65501eae59bca8a4
SHA25665b26a89087539256aba1f42a99bb5519d4a2b3c5da72ea4a350102d9b781e68
SHA51265719d6c2b4ed02dd093100baf871c19acfd15e4f2262dd0644f8277c3b5a9cc5c8e26c9f87d35d2e4ed75fdf7f2f0ef7dcb26d4863bfe79bc3e36207f5e3fb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5b236854174fd0a3786defd2546e474
SHA1b1e7bd9665597b1ab30d18c87d83fa2040b345de
SHA25606bbe8ca0633054eb2eac49794ba65220e50874a1a153ab12f87ebd8f92af668
SHA512e3cf152122be0b7dbf8d779f9120845433207d0bcefaa7c30df1d1c09f481977d25cc222d0e2e7d0e6b196aad12f4a6d25a4762a9f66bd701dad0592023a42d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569f03f8d58a71efa40e52bf7317479f9
SHA1e18d853d3003253820f1d8b984457a99449d9905
SHA256510f8e9a658f3a7b78ca74b5cfcd6d5df4c0045bf1441b98ab0418e14e54efa7
SHA51233fc658abfb00a9fab76207fcc7411f5109c4aebd0089f05ef45885c81ff486a825ff933c3e24d6ab9add3b5d7c86378510d9fc7f92fbbf227c6c2d9ffeae911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c37e098b24fa4c8bea58067e92cb0c9
SHA1611b676bfbcae81e88e0936b9c6c4a739e74170f
SHA256d45d41e02dc2987b9132ea9260462039aac34ae0edfc6ac71a2925d2250ba5ab
SHA512d2ad3e634b395e320da81c5a4ca39ed8d8720206ffb29a9e039e667e6623b2d2e07602472d157a85ea43d8da9a0e65b8dc865b97440e9c44a9703609418c6c70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572db25d728998b226d35c699264a5d0f
SHA11369af1df217fcdae67826b4a2e7e4274877de3e
SHA2567386b34ad0618b2afdd3abd000800dfaadc7d4101f3cbc30cbdc9f0aab1b2532
SHA5127ae4275e85097e09b1a585dd9519244cd6f99bce682bffb75c0c3c8c7d84230e7f169857ff2439685ec3d918f2d6e4dbe7cb1c1eaad9e345cb3f6f1c4b309524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fbc2af48dfeb73c6e425736ef13ae67
SHA115be5df47f479c22823611cc7627bdb6c15efa0d
SHA2568d6adec8d7a81101460791768cd784d98cae17e4cfb362f01ec5008b2253d8ce
SHA512e4453e848a5fcbce8bb59b3dbc3a5b85ae848d965d7f1a444aed2c0c216333c73972647b98a9c606ce672317f2585e7e454222bae04381eee477e44d62a8ae3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511256aa853810ab3b5dcfa8c81dc1bd4
SHA11a3c9f828177699c7d3e115ad55dcc8e468986f3
SHA256fdf736629439f7a5c1da0e6fd7ec752b81041132a81ab24ee5414210c2f25c03
SHA512bd0901614604a49d124dd689ffe8acf6db02eeb3e0c272e9f0cd5f8eb0e38f98d15c0cf00361219ea4e8216702d7591b54f880cc083917886644942d911f37af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599b5b7e4eba3c6852a618789739ef841
SHA134501ccfae5705f82e691bf615eabd92343dbd69
SHA25692a87eb92da1ebb59b7b15722cbc68848796eabc39eac7ea91b17b0072ae3889
SHA512af21f2055f6099168a27c99c941e0b0a2dcc926784d6847557b0f3648467d049a08da7b27240c5b92ec40e5a3086edbefc70fcb26cc7365c25cb67e93461a4cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a2fffe48d9293a0272b2d9ca911f1aa9
SHA153bc52ce233e7c9e6d3c8f7c86b1ef23f25bb92f
SHA256256039631df9521ef4ee708a274355468e87cdc662b41d43148962f02595522e
SHA512da85058c35f41ef05d66551dfacb558f67c3286fa038cc5d1a10e0c57fd89af16b2d001e52869a15dd16172553b88ab863ab1c0352876555fd3d1c6d00265ab5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M7GT0RRO\glossar-js[1].htm
Filesize706B
MD567f3a5933c17b3ab044826d3927d0ba9
SHA15957076d09bacaa6db8ddc832b4fd87ed8f05f8a
SHA25697e800f4836b7030dd58fe6296294b7ff5ef1b5eb0e88353f230ea1608d2bb64
SHA51203ba224055ffdbf32b7eea30c764dc18d66cc6d8707dc5fafab74e155b0bb3d4d691c5788b033a68f05299547297125122778fa7e3252f93e7343d918936643e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b