Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
49bca15c1f3f3d62b1a27439ea094400_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
49bca15c1f3f3d62b1a27439ea094400_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
49bca15c1f3f3d62b1a27439ea094400_JaffaCakes118.html
-
Size
79KB
-
MD5
49bca15c1f3f3d62b1a27439ea094400
-
SHA1
ae4c094be1959e1bb1a90614e3d7b21b85ac1ab8
-
SHA256
d81d50e9972ec7cb9f05661cbf77c5234534d14fe16736c900dadb6a7b3350c9
-
SHA512
78163c2083cf6e34bd2390df5b4ff56b93f19c64f5b9cdf3ffd5a756c5ef02b1c21a0e7ec72c47cef911b5e9fcf68f3efad716b9a83ad11d58b3527a5ceedc36
-
SSDEEP
1536:fBOrm46B5ZtKOeWjdLPccaw6E6z3K+IMz+5m5EwpoNJxtWdY0ywefYRkHXJ3Tc/w:wyeWBprSwes5Dc1eukbd8fC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000a3389a669f1954e1501369905fc904cc664f08bc254c3fe98ea3b602262f83df000000000e8000000002000020000000b62d7bb5a8b174de875743c16cb0863a5336c6b8ed6a314d1364df890019410d200000005c6b57039a2f05754eb11c0b79ecf665dc4d04222c20bbba9804ae53b32b91ee40000000d7b464da10f65a13a077e75519eb28ed7cab70d24839c915111aa0044166ba9d38a7766934607a99a0495f554cc8f8b0a87ef4d894e868d86e89431a55ea9965 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 602a2d76bfd6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9F158BC1-42B2-11EF-BD1F-566676D6F1CF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427213910" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1952 iexplore.exe 1952 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2244 1952 iexplore.exe 30 PID 1952 wrote to memory of 2244 1952 iexplore.exe 30 PID 1952 wrote to memory of 2244 1952 iexplore.exe 30 PID 1952 wrote to memory of 2244 1952 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\49bca15c1f3f3d62b1a27439ea094400_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1952 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1891ff762179e95bf101e76d20f3c5b
SHA1ec1b2998cec1e1670e0519915f39f5f109ba5513
SHA25699539cb06a828ecfecf66bf3dfe12cfc3ccbebb8b19f36a5bd89246044108d31
SHA51262298cb7d37edd46243d29b219621e26397f2665773800efecc6e3f28e21fbe27594daa739e87bb2693cc77e9c73b3cb90c93e8f126d2a70c9a2cefb421bcbf9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f1ad2709f46a67438c4d24d197496c
SHA1ec2f0e84faf490f491835031721c7e8c35b93df8
SHA256d38369c088c754995a7cdb275b6dc8bdee58af565219b3d416154cf018e9e4c7
SHA5128dbe8a9cf8ee0dd81ee67974a6d91216b680c71cb796e9817f929ce06bc3d785e2c6be1e70481909ab1484ac1c054ef78cad64e75480328355d46756126e88f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d244eec8a7aef60618ed74a194d3223
SHA19492c3011e201a1d0036841e588c142474351723
SHA256271ba454778e3954a5ae8146ae97f01e1409479c23b5c856e4bda2362386d4b8
SHA5120f2554b6b5c2639ab62af3068c384d6a7fffd5e518c5c819f13563ffa4a500bf67103dd1e6768d12014533b3ff6a25e584a7dceaa29ef31c468927f4371e77d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b49d98cbb2ab5ca621e0474908a4878
SHA17e0e80de3fb2ab146fdbc215fe517ed45458b858
SHA25626b232363bd9cb21af78806b7fdfb1655ea0d6795dcba0b4ecc358a3481eb74d
SHA512a761a5365bd42abb0a25c91674afce5e90bb89483e6744a1c82dfd82140fec44a34bd7fd00cbfdbc6e4e1a5f22c48e49a7372342fc76dec6ed16d8a5f350b208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0da064cfd659fc5beae7d75945c5b09
SHA1b552bcb24be24e14bc47759708a65d7dc67ec81b
SHA256c5824ffca3e838ca0f5ca18d69235e79223c8e8c6fa0ee307acaadb6b136a487
SHA512d311a3d745d226619cbde2a0af7d8e8062649bab95e160988dc00f007041a1a3648388af1bd31fa54d9fb0e7fb8293f791adda39451f47f5986ea798ee48c669
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd3e78ea8212ec763e01a00e826e572
SHA1f0f8454af2946b42c13e0e35141cbe77fd188d17
SHA256ca38c61c3ebf82b68a939915f59a59d3eed0136759a0529372f09a7b0f442ed1
SHA51202c17042d31c0002135997069d4991904be8d0ffe1af48b4bbde5cc71c99ca9979d847d1ab642d7ec808fbd77dae2f254159f737461aed7e0a97c274cf2b280b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508778ae5f27940db8ac3a85ce1d7d65d
SHA1cf55d40fe2efc7d7b25183e983843cff23bd302b
SHA25670608d057a079816ebf9c2d7b4721816ec407a2f455fba7262b391dfb5c0944e
SHA51290c28b1547d09f30abb78d6477c98df8cf84e2d359cc32825c0777d9cdbfde151cd4e275d19ecb549477a6c28912c2f0a7a1cd084078cb3ce5e28eb6c6099881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8f2a82b9fd68fbacd42bf8e11ba7c9
SHA1cb2e99b1d88491478a7e35224fcfe67c28e1a5a1
SHA256985f51b607ae7580e726760bafa06ee9c30400d193bd36b731a281c5e92ff606
SHA512143e92b5b5e609bda5e376ac536ebabbf27a8b6751fca1e4558c0bd57e002a37b4824917f171ca18c9f2aad395e764117e5c92088659211bcb056a873d2cab83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597848221236e168888f8d25eb7033a46
SHA134f8414f47fd620d0f55c5eb857d5c191e050463
SHA256534b06a67a04823451d0d40cb7d189150b44df66ce4bdcd57bc15c8a7163c069
SHA512dd6e94f8c4d30ead84dcd8734a7b4227ca736620bf1b492c24c1945969f1063c5602cf0f4831d7fd23a75afe2cb128465c1080c8a5fae478740a221e2bfeea34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD526bd65f196433f61fa2198e13b5656de
SHA176f26d1e880ee850b00691dfffef44d87da3835c
SHA256fccda589abe401000c828a2230512aaf4ce439d23386d48cac14d7c8de074ab5
SHA512002342934ba0f5884df3d8e22005a915be096f02f722ef98863a0b61d6dc98ba17b933f12564caefbca5adcc4f21921ca7424f05cf135ac4bff4829c2ce5ced4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580aeea039fb3c479fb20130f72c0ccc4
SHA11c16efe46fa847a8dadd6dfd2506f2ac54d6099e
SHA256d42f05bdf78184f8a844584614368da78d31d2908675f4440e504f3a2921c2a8
SHA5123ae31bbbc6c1e9978f04a17111035dcc05383a907144e302380b78c0d6fda24ea29fbfb1b746d58e213239fe859c21ae63f8df099b2858d42ed3f67e5f83d4a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD533e65395037c110d137b2711f768f876
SHA115bd617a6e15c70f454500a5e8f2ba9dc218dafd
SHA256c09e788de1d31ea08acba67db1e1304d12a7b11212eda5df2ba534471c2b01aa
SHA5124d9f7ecc28513bec41af94436391aef202db8de0a108b28d447b0249f8ea19fa90de66fff04d99a1cdc627af43eb2339ed4bd5eca7bf64139f32b345504fd923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55a58ebcec0a0f7c7e1441ea573bf6d56
SHA11670bab370f2311ef7e39ea2bd45b01e9c4a7236
SHA256b8e9d4bf654c15dc66ca3706c90735a6808b55ca7e94ab7c73982449e50d8923
SHA51260932d7639116abc1aeb3c22b65210acedbaab81cb7d9770158e9db306306a13515d88fcfe1d6daf8c629ee03a61eae7a2e589f60c09f983190b9ce90cee06ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff48e251d4af5cacd253508a1125795
SHA1086ccf85cc21f2103d023c6b4a936d94252ba6fc
SHA256b1bf760ffa04cc86e09f0b04b3836ec32b2b9f6e4048102114b59bf633bd8847
SHA512b0ff3ad29736a9b23a285bf101a21629517612ee300ee12d81a89f24378f0d953816fa16ce10ce5c708eaf3016c9c2530e7a6a8b167ea516b9e99aa138f39478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500d5d640179b5b0935b554d435398263
SHA1eda7fd58f2cfe82a842eb098001e7821af1287c5
SHA256c351e95d008296c63d065035c092ca7095acb8ccc1afe3d811d3def2c8ff8f82
SHA512ca12855df349f4b83ae936ba617fb7cc127bbcc50d552c9c3bb53bc8a68d87e817fe361c774521d0110e13fdb45e96282c0014a39cbddeb5656bb20cff568e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589495b6c3285ef842cba186aacba7452
SHA15152f025829edd282d388ae8c0fde1641204d6a0
SHA256baa8ab7f00a96ee9f101a8815763374de2754a67192db4bb1f1253b7f787094a
SHA512ae46380c5e196a941012262456b3baca768b6d3c2696d137f82e6812038883db863d952f48e969b9b0f39cd64bb526f8c31f7d3bf57e67b732be6834bf13acd7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d15db216113b2258f41af0c3247e0f7c
SHA13bb6479e1e49693845354e1f0a839e9a149989c0
SHA256c4dca6108dea751c3114a87e4797656c7b8c52b4cc2479f92ac316bb3c8f351f
SHA512ab8e69517fa104afe5001c239a67f3e850e7776c55a303baabd55bc1e1cd1a7f8b835a6664d04797e83df71f7087c1be8bfc0dbde3f264f945da2a06744a5d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce788b3955873973033bfb6c750b90e1
SHA11b07b51b189a2d612fc039605b104c1775a465d6
SHA2561bcffa058e3ed8575c8619a2960469c6140b933d4c36fc46eafca3c0902bb346
SHA512d873e5b824488f719e2ad6be19b17bc3f6f1f089a068ad70856c3c4e5ed2f8d315f279bba225307dbc4b3413b719b19fff84997087a65867536b9ddfc3e53dd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d19f0b4492c4a0d93a1a8897715fbcb4
SHA15100ef195a60802c02eddd079e02d92dcfeb1044
SHA25615b9bfc23e777a28faa7beb95cd9c1c1b7bb9cf2dee2168013e64d4288ad12d0
SHA512d5545efc86bf7e201232e82fd7ec0754cb5d0348ee068fa49e309481ab05ea52c5951596e880c92b9912e351724e309861f721474ad380fbe5c075eb0d8ff9c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595b754bb3fda904248536df4c7a6aa7c
SHA11b1cd794b0f2d17813bbbd9a3302c2ce5028ee66
SHA2564fcbd3459f33a93a0f40cd89ff93881265d6a71038da5dbaf62ff56b8a97d952
SHA51276a83b48a39e60a98f1fae68517be04103a69c50e0cc2cdf4f9240c07fbf1b70c2faff15cf67fbc9ff7f5e6182acee86acdccb739477b058dc1fd01e909fb0bd
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b