Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
47d2c754632976bcd1be9b4752a102cc_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
47d2c754632976bcd1be9b4752a102cc_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
47d2c754632976bcd1be9b4752a102cc_JaffaCakes118.html
-
Size
122KB
-
MD5
47d2c754632976bcd1be9b4752a102cc
-
SHA1
fa514f8a8a8f811db74f92792bc32c4ab7556857
-
SHA256
decf7f87299705f8d64f3c911b7fa989c573d0cd503e04647e73c65c9a89ab47
-
SHA512
34c09abdb0cea54adc04fe905af8e772605e28fbfac21f900e62caa62af813407d8809ecaa190603df04c8a4e62bfd80730635f9141b7dc1d17b09cd12671b79
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fc0I4HApOXLdTn9cZSNt1rp:s3kQLrv
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 901c87515ed6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{626921C1-4251-11EF-BA79-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c00000000020000000000106600000001000020000000ec9066d6aab48392e3aa283b4488894b54f09616d6cf9a56219d84824ed4f71d000000000e8000000002000020000000e082fb1ba883f97f3e86ff54adacf60211c87327c159782c618f09304bd593832000000000a4b08f3e664af52a7711e2c6fa7a58d39323015fb73f4ee686a3258974c54040000000e875cd989ab0b74abe9b9bfa6398a898bf98adc46a0332ee3db0fcc62b860b5f9b347ce0582c9d6fea8c5fa994f136358f06d3d9f31a613212f4e928d208f211 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427172145" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 468 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 468 iexplore.exe 468 iexplore.exe 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE 2952 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 468 wrote to memory of 2952 468 iexplore.exe 31 PID 468 wrote to memory of 2952 468 iexplore.exe 31 PID 468 wrote to memory of 2952 468 iexplore.exe 31 PID 468 wrote to memory of 2952 468 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\47d2c754632976bcd1be9b4752a102cc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:468 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ca96519fee51d0c7d7fbb9902d0b1e35
SHA1823ec1b48ae607c454ec9f22c3c2882892f60b58
SHA256eedb77a97cd396ff4e70b09a3f59c33540e163c2d11ee0b107d7da4d8ee2408c
SHA5126a35a603509789af1632907c70f4a1638b3f33505efdb4c21a32e1cc0d62e75f41dd3a6e5a443f00644ed8261fa4d224434df77de09db0a9dfd65723d1474ffa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bd2e10fb585b4937b783637e23c881d1
SHA18b665ceec0520b482fecfdaa07a66577726bd58b
SHA2565e9844bb25b95774a186252483c43c258c7ea94e2cea8784ac8736bcf96171f6
SHA512d0354a25e9fdb5a56a2233f9ffaa2002dfdcfae1ad49c70c926233fae6e651f2c09587f29e05f9a911d1b8a92c00c4f23d3dee53381467ef63e67c7392144bef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b5cb2cdb958fc50f060cd7dc796cb103
SHA14954de3f6fad5e85aac5579c1abdfdaf64647a3d
SHA2566ab5b52e37602cc073ca6c5a5989ca65e023243d7081a90182c4c4072e423649
SHA512d9e4a6be795be4e6ee992a0e0a27f21becfb305a5fb4e781331f299aae14d69c094d6b3dda12938b10055e3b63a64b12d65dbd9fa7aab742017b11ce77269ed2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51bf8fa60f828603e8c99d9791eb40fb9
SHA19d2ef4afc96a61b663891b2db74924250cfe5f28
SHA256129d7db2dc06490571cd1998c434436a4ede9f2eae891f3a4198ed8e7d8a66ae
SHA512006f9cee9bc09d75f05951cae86e540dff5addf473be3d459f181a70ab638e261786275fd4609f2cd03e7b02685f5ee6c3747314df6416d58bba220f3c2fdd00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52fa089893e66f954198419d44c217129
SHA1e2b5c00b53676948d886f97e7d9688327141e7f8
SHA2565382c35ae6fb36cf45de292cda7b9e627e63ad87a0905cd34fff97c751795086
SHA5125274aadee1cecdfce6ebf2d5d13ef362a45fe1ec0f6066b059c0295e72048d162aa4f69841276100584e57c2f4088647c8c1b617a394b659046b666feb1c771c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58eb78ca5b61de54543853f3ea0540086
SHA1e62a42d53756b338e9fc1c580ad3da3efae396d3
SHA256eb32fcf8c459972d8abf76ce882e1a52d1d00587f06f8634944030af1140ccc0
SHA51204214bb782918ba9ae34cdd154292989d04a319490b19009acefb438a1ffec231d724eff57b4dfaffdb71d65d5deac3cf76b3b94420014202e843fe3cabea8d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b63c52ad84b46e6d559e5d859d52f028
SHA1326d9f8c80debfeb96aa653f67a84d593ac311a0
SHA25628975b4d874a773109f19bdb6af678274b7ca9302ba925e5e1232a9beeab1645
SHA51200cf4c0c3f80cf8e6201da44e8e4f754765354857c0278a0310c585f0b064bd162f0c2df3c5cad33f658e93c4f1bf260f01754f0cd199ecfe20220d564d4482a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57fbcf884f2ef643aef393eee9511d36b
SHA1c0121bc52c234d3697144cff99fdcb400a07b424
SHA25610c073f8ae6890e36492d5b083765a3ed9691d9e7334ad3f3211b495e37de668
SHA5124e6f5c1c7d91427cec48d7db3fafa759a7e43683dd97f3f2fbcd2480980ec797936c9e0bef58fc7f0b3c391eb17e601a0e2e7f8751b789e9e2e951e708593a60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ff8af0cfaa989b4f91f38fe819249e9e
SHA1830819c888291f151ca7773003112d4d8ad20d67
SHA256ace73107d3f6f64dce9b630c722af5533f5867aed51c7e6bfd64edbcc51b6831
SHA5121bfc71eb22a89b5c68191bd563d8fb063d920791d94744d897c24fd150a6a23c06c873f7000b28758364c34be219103b1d8600da536da126afb29ced9f48ef3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53f0d18083eb0237fd1d1dba9d170e2c1
SHA1b8549d473fc61bf56e0780012f553ca289520647
SHA256f04ce88ee62355fba33f861c40b9b3becf328d32594e07c871d3e5dbad58d290
SHA51240a198b6d549b2128cb39546098be81b585283f9cab19facd356b628e56bc70fffa83689c46ac6e5f39a1a1edba1d877556fb9a19c664688c67dcb462d4745d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55d98a739e16be2cc8c688bb0070e939a
SHA1870173963f6485c7e06cb15ca2caf7fe9deab0a7
SHA2569e50a7c87e7ace1e83f04d61e66719947b599e812998f4710a62351c7ae42e5a
SHA51267d85bf709e7d55728c2c8af045f40c5e0037c4fb89262609d98b1787ca77307c9bd39becd31b0af88aef75667cf9b6656084418b470ebfeba244b3e2a6208aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d876d09b8a7ae0d1ebc3c727bc9ff9e7
SHA151ba626fe8b855d40f7c1288f693f67f879efb8c
SHA25699e5d50e02ee48154b309ec1d45ae4f5f09003dac4c23c4f56bb868bbb19b70c
SHA51267dd06797a588dad7ba3424f52455af3acf3e0db9fc372801b030bb7949a4572d034b8b4b45e7edfc7beef1044b564aa173135004fff7f8c1b69293265d64ee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ce1770ef7c26ebdd3b4493d943ff2232
SHA1cab007465d6a84547e66cd615b734ad1a594d94c
SHA2567f11e51d1b4cbd505a6828a82e0ce12cc926cf30751bcaedc71b9415d3e180ba
SHA5128ff70c29d646d921ceef397c0ece08fb4a22b709fc1f160d79afb85aa20448689d20fa6dac53e94f4b96746e3131e1e1b7b1fdf65c1e5400b18538a71cb49f08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53cb98550529d80fb2bc89bdbac39d3b4
SHA1d9de9c08ab0fbc6dd608846918966a2389e774da
SHA256522d6f9c4677d73d64d676709e4071ce9fef88127c07579c359e39fe6eac8a40
SHA51227175885f641431717638f9ca20103c68dd9e448b879e3cbe022eedadd6c4b13c51006cdc14182f4c962041b4786776be470c961379a5cddfa6415370e7ad7fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b6c4c80b49a162cf75a6f6338380b036
SHA1e17dbe91aa86c5bea41c7abf6b7f04678372df1e
SHA256b2b8015b8a172eb734ea5ee197903fb40153b39f078fe6f95ee11e80b7ac89ea
SHA5128003af229e0d9dc15c8a93f808be9d70670bb4e4b2642e756a62ea8f01f161f4eeb85301c4b7e00affbd93a2017bd60eb05666e3c042f8d478943b38c25eaa30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD52e703d97d13857277aa02f90d829054a
SHA181968b84c4565000d93746d04b030e452286d7de
SHA256099161cdc1d8662aca86ad29910497f522ed2115efb4fc7b6727109b84df3581
SHA512a879dce4be4d57a91eec712be593407033dfeb7debc6e1a17b28da64748deee1418d4ed289263ed797bb01b0148d46d5e03f81faf304a3aaa69c4bfd0d2233c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5601b50fbf411881b92e3a3cc3a2961b2
SHA1ab995f2133e29943622c8824c8c0b5d9705b8c00
SHA2560aa01e34935bf1148282453af9d3f328cf6dce0989350bc9856cc4468acdd73d
SHA51204b6bf255062ca57dd8f56aeaa68232551258600b2dd8ac17ec048721894c03fbebfa0fa297ecdbb64a5693c784b2d960be21e9998cbe1ec5e24759f47746eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b282858c11494a46076419f871844551
SHA198086722937027a61a33a55642e2931ac799edcd
SHA2561feb43a2c9afc7f72728dce512dea7469a9740ca84556233891787ff5c32ccd2
SHA512b9afd6bc722c5c026599b509a12ef0cad85cef6f193953d26a1da56a1416824185b96a0be2a08b871e34c2a20de0a5974dcbbfa1580a882569fa379c060b0b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b2ec58b8429327cf48264366b5c533c
SHA18500d76bff3fb5592798c0905bf9019d14b7807d
SHA256a5bb37f55d6777ae3857b3e78f70665ebf5959010bc6cb2c4d5c291159518e0c
SHA5127bbc675ba66cf1bd0779679e64cb72a3d8715ba65656e810f4a43256b06baa9d174a1e5e89cf425340c9bf94219861d0108bea6dfcf96b396fbfc842ff245b23
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b