Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
48697a212f25f379e557991ac72054f0_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
48697a212f25f379e557991ac72054f0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
48697a212f25f379e557991ac72054f0_JaffaCakes118.html
-
Size
69KB
-
MD5
48697a212f25f379e557991ac72054f0
-
SHA1
78e9a120bc9c38f32159ef2747e77198725d0441
-
SHA256
2f209fb51cae581d5a9f85f22ea386a93b660bb21ae3163f69f28b57cc87edb6
-
SHA512
88a9cbbd258bd9af05bd9d55d491a856f9f67d44351ca4d593b49d671033b5576f537e90d614494075784267e09c17eab45ae24a5743fb7137aff5585bc39f95
-
SSDEEP
1536:gQZBCCOdx0IxCsfv5kja9orkdsLOjwE3dwjPXW+KdSyRUUXxBr5Gjqe60gAzCdKf:gk2v0Ixt5kja6rYsLOjwE3dwjPXW+KQP
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427183173" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000706055897ea6594ce74065eab1f8eec46066479fbf63bbd6debb6fe7585b7a66000000000e8000000002000020000000d94e63c059dae86c4ca0aac72e243d9140b2a49d3df4104fffe4cef65209522a20000000dc73b6c9bc96046d90fc3fd6ad387b3f1bdef0fd048a15e8e214092a4ec199ed400000004b07b3f3ba62d3ce6360f10f55d92d80f870dca53eed64b43d1dca6e6b39cc04e95bc1312d848177005eb1f2b28a5440dac5b738e18e4f1b643dbe9e45bc9aa9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20b07de677d6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F9C4C51-426B-11EF-98E6-E649859EC46C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2584 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2584 iexplore.exe 2584 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2344 2584 iexplore.exe 30 PID 2584 wrote to memory of 2344 2584 iexplore.exe 30 PID 2584 wrote to memory of 2344 2584 iexplore.exe 30 PID 2584 wrote to memory of 2344 2584 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\48697a212f25f379e557991ac72054f0_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2584 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5120787cb5d7a9a19feae33246cabcb12
SHA12377f79c2a472a14b2f2dbb1227f36eb401cbb0f
SHA2564c708dfa363b8ea54c25aa9537748c5e0916107634cdb5f8b279a437a847dbf7
SHA5125874db57f8ea3b0a595cecfdc6b0dc3fe8961c6d392791c9a365b3ba50cd09f32f67099bedcd30b6e1b2eae9cc0fb34909be9ab3b660b2b41d3c051d27ca578b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd6d20dabe262e66c5ffbab22ff2f8e5
SHA1b410bcbe1288fd0969928c0ec9d8514b3f43160b
SHA2569970c131ba1e78a2817f040b2189922423fb57fe17321abfa10314568810b5d9
SHA512bd0fb2390f62d5f8e1b41fb16dfa399d1529b5a23f7acddc1a9d71bb9c10b6decb2dd07940de4ed8befda01a8dc225524deda42673e57105d7fb5bd8f9961fe4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5928559840df553579d8a519c61cf38d4
SHA170ca2ac95fb495fb5f0452fba6db72ce86bb7f37
SHA25685c228b953607c1658d30a7c95fc59765d9f689079d0fa2b7fee638da7824677
SHA512c52b5100995197a783908d5109066f4e747f558383e2735ad93f0e89cf1f04cdc2b548bdae048c844a9483523377aae9931ea45b575fc99f1fff2f8138f6fccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52fc5cd4d2ee6ecfa73c3322b405e547b
SHA1dbc5186e5921696b6d9c2707b5695edb90494318
SHA256acd661405b5268810775f2258e8b9bc10811fbe4517e03046c8667f4fd56c01d
SHA51218ab80bdac2fd095b97272d2670d33541d706a0398fb39cde3bad632dec7b75b87ac2a70a534088e6ef84649aed2044bec1efe24b97c390754b93ccadcaf4016
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c24e96dd042fface7854cb0c381aec47
SHA15773931d110acba5edcb3ddbacffd2deb084518b
SHA2569488ff63a3a88b6e9a7683da3a0a5d59750accf33e364a66a6877411888a5246
SHA512de1e7fe6421b0a7f1da56f36e06942d0601fd82f13a7239a4e6bb7100a684d977bdb38f649f8f740dcc2a7d47bf3b27062b2014c08aabf1e2c4f6e0e0dcdfae9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5409a6010708bc1586095c869d004cdc9
SHA1f88dafdfecf9b87b9dd7266926ed11cdf621f114
SHA256f9dc05a2edc5708634f59cb24a16163d101c36252f1c1d11ebdc2fc7cdd46b69
SHA51261c707c0758562c0f3d60111a64b1dfdc754b64651f4cb31fd0cee46dd1896dce788af779e28c6dfb36a10e23d339427a8bffe64f7b26902c9f9660b57e2575c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d515dd736cb26676c0da50ede190d0c
SHA15852c498d25a2af21fba102a0d328b9752e47a5e
SHA256353ba8111788f79c221742df2573f64324c990e70b7c828366e43d0cab15a41f
SHA512eaeb14e50cf93c05ea393a35b41394576b59db2e70ed143c097af9aa6a2ed37670af1df856048e1183c757308a2c5415b7d3b0705cadb6e4723441a49e3b35f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cfcb7bfaf65f689aa4161270eb3b8d58
SHA10ee77c1b75a6a6f126f6d244ef4229184f2cf3c7
SHA2569a4df22e3cdb5d156a5e962a8a29bc183e527c10eae9855c109af910efbcf47a
SHA51200a3d5e35cd0e80b226b74eb79c0f256946a5363c93fcba5c4c0543f5f1e5acc77c0f469b4bdc5db3c21ee7a48d388bf743cefa63344cbef2f047e574abd93ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50359605153857ce8aa088945d25460eb
SHA1761229c1282f640a00382161f5deb102961b6d6e
SHA25651a0ce673855b5cd58990fbbdbf4a1c44fbf45c65e87548551c0d7aca0b0fec5
SHA512e51a17b4396f2c7b9c981e4b5ad5c77135288b78733682741a1a17b1fb254eb4d70f30d9c91aa4a655427537b2830324f4df0d3dceeea15a80a83f2b4868c9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec747bf153293540989e67f9138819e3
SHA10b60b8bedad626ef199426608ba5c7b69afef08e
SHA25689759eaf86d4548c0b4f16713738ec908bcddbac4ed3e852f07e38c7d0e4178c
SHA5120e8abdcef242e15f8af5219cd9f0d310ee362ef7dc42dc77eed8848449bb8ffa5a8b4069ef101c3af1c4fc949942691a45d297eb9a63955fdac7e8b2ed2811aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c336ba0ab9f778a20ddd292a89836767
SHA19e34269eff937ffbb22c03568ddcf1f72cf16ae6
SHA256702b3fa8709d9d50323fe25bbe24a950aec43287bfbc66a6f774e714ecdd70ac
SHA51250de6f79ac4df5719a43cf3c189563590376956745faa52bac74b19b9ec142276096f2d5574a9f9a2b78b476718be6f13cf4e72e8b1801802270486759556909
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD556f4610fa5587e22ee358649adf3d0a3
SHA15d6325644b4350a5a79da934ccfe90c189e6adbe
SHA2561eb8247a12c4c7f682485470095c8866b0f7dc57f8463f004617660e469894aa
SHA512e29edc38cc29bd8cd430eac8655e6b97e7b411d15f3c1e3192f1dbc9021219bb202bf5b910c9ec157fcb7070719b2d87429d785f39891a19cb09a0db8c126a58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e6d81c5e361f68accb809a60d4702da
SHA1bc8ec1b70726a251d5d4d3aea523a91c377a4a7f
SHA25621b3f96ba8536fe00be443be82d38c6e3df3278b30b2492c4783a69af333d6df
SHA5126dbb763c7252ff368273d8216ec476c4b49102b03d30a9e5e9d528e888193c7678116f42f0e9b0a731b82998f14c791cf9fe04a0387aac10fd2347de9b11d781
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3647b5c6f1870db6debdf026b2832f6
SHA1e6ac599df4487cfc787868acfc417f4b1bd950e7
SHA2560ebcea2d0c0787f6a49593c42ceeb788fae87ee35276786e3254e94ff825edbf
SHA512dda7d99094b2c0dea2124597a0b8aad1a1e9aed53bdb9a4dc3381c478b66cabdc2eae5dfa257cdc0838c83ea2ef9682d0d093bc239a46111e79ab306138b5c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e72d3da540dfdeca858483ee75bc24e2
SHA103324ee34b4d5c87c0ab612706a95fa2e6f86b7c
SHA25665bf9d1d76547dc54c4bf353dd939f71e9e70b1df4adc4e3392b8e82ecb4bd22
SHA5128b3a0e8b161d260cf12d4cc8711ab454c26056fd6825d73220f9817d396eac0120f9f44829bc742335f67fc3947aaa33f6cee8e47b7798405c7dc9e856e38342
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cec9dab26fa5fe3693df181501067b2
SHA1d0746889d4533a2fd224891d463faaaf83a2c0a9
SHA25635c37e40f3ae9fc19644dae7038b9a158b4619ba90ad0f043c2aeeee4ca6ca91
SHA51203e20a8040f49d2df2b4601dead7f8b0a06f320f9e90d8398b94b46c2f3da7dcea7ce8bbc680c04b46411ebb18f6477ab60ed84c169151939184d52857b71d92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5838152413fe848a7368aceb16b2098e8
SHA1698abb4d7beb15cad409e7dc54ee3c454b29aba8
SHA256e8b2e6843f5fec9e973555ce24872f7f9d51795034fe4ce671dd8e4aa1841d69
SHA512b54e01638876a5ba73ec8df957db18ce9d24880e054551a5752386b132b2fb505ed21e83c06264182d4020f1053ca9d4cbf6fa5b3ad5d5121b329093f6d9b687
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd8797efbd49b0b92e98d1c13cd6778e
SHA13426325d885f02723ca9f0af05648ea26b11de29
SHA256e5ce1c188db84a41f138af2c61eedacd53a167ba49f9e6203b253c6beb551fea
SHA512365cc6538c863930774223d2816bcdf5780322fb3a47a289fa9b0f6d679a1904acd99f6807378079aca441c40c2da6fe1ea1c6dbe7f94fb2044c42bb6725bafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db1c12ead63548033a7ed98d4234d2e9
SHA1fdeb18c4e74c33e18c7b68dc62d2043140cb61c8
SHA256c6c7cebed3043fd2acd7688f68c9cd6d72e40d690bf700317ca72d7821d54800
SHA512321cca067cb3f9ce5277e92db09d67a0a4b241fd3c2dcf84834ef3e9fcbc2b81e9c281237603ccafea1759408fd34695145c219a50f08bc8edc947f8ea5d04c0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b