Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
4b75d1e0b35222cdf490246b5879fd15_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b75d1e0b35222cdf490246b5879fd15_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4b75d1e0b35222cdf490246b5879fd15_JaffaCakes118.html
-
Size
32KB
-
MD5
4b75d1e0b35222cdf490246b5879fd15
-
SHA1
483c334162bbaf103bf06cad7b4773b5f04c2d00
-
SHA256
d7868a1f943bfc713a307c4533ff8367ef03a3ec5827bf1b2f857f7203062bb9
-
SHA512
1dba9b4da325e4a9d5ea2e4be199e795f4800c5c46f20b19a0690f7acd557d47d2955aeea4b2fe2800daf95bd9f481e4a92c4936977c3ef924c8e2b45a97fd85
-
SSDEEP
768:Aaw4CMFRfq94AwD53CcvLRtVAkyI0tX/qm:cM7fq94AwDlCcrVAkyI0tPr
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6C9AE711-42F0-11EF-B233-C2666C5B6023} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000026a2d24aa8d4dd44a11cdefd28cacc51463833e6c934090845ae381b67efa060000000000e8000000002000020000000994a86470d3c28dcc92fabe3744ca71f210f87eeb6eab8ef25b974a01243e6ce20000000f8e9e40c431e46e4ac9e88fe7770c69d92261080f0d0a0ab23cac7b02d4ded8d40000000f95ff2259b39d1a96a4d352835dc50abe7b1629bfa4f732dea45de63ec6c2f3f1ba0baa391cac165c04aeaa4a90edc9222252d0c262f3d9bace5b46482940d42 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427240453" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30dbcc80fdd6da01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE 2560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2560 2192 iexplore.exe 30 PID 2192 wrote to memory of 2560 2192 iexplore.exe 30 PID 2192 wrote to memory of 2560 2192 iexplore.exe 30 PID 2192 wrote to memory of 2560 2192 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4b75d1e0b35222cdf490246b5879fd15_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2560
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53174958479e09d985b682d159f45420d
SHA1a415428cb3dac43bef3cc3e7780d85ab4b6071f7
SHA256f4ce11434afec7c7de7ca3f8a80a6ca5766b127ba24fc46378c7c55394218b84
SHA512d9c6f574a79b9781e4896dfb67b04aae13881a28d48ff0996a294c217ca912a0e225babe999cb9a5321acb0969a32d7d149bb5433b61bb58644eb74ed203d13a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e5907f9486eada9c2f9726867d0e8c
SHA195eb0f4bb0a7822c1fa8a2fac04115bb2d4220a9
SHA256c879602b90accbc149d8e743065fcec796be91ebac1be0de0d84b3887492fe41
SHA512f588d842d26af7e067d0b81bb6a0d0ec7f9b41aabb147c2362dbeb0d5ad5833af4d069ebfe9c28cbf5eea0502ba9665d80206a51478f2f23be22337157abaa86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a9d22ebdab1539e13e1bf09031c652a
SHA1aee2450c9d58bbf0c4656f1d58da9a7666ba3824
SHA256c1d431eaf001aaa06574dbdd14a9592c3d61b09b7dda0e4ecbcb4d7291a0d8e3
SHA512f048da0737a0f9517b9f75f63b532b8637d3719d77c6a77b9b4585f6fc1a3179f5147c07c22022eca5e110cc433fe1f70a88815ad29437015a86e1e65ccb30e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540042225f1a9d5edb8514e3c0c44902c
SHA1b20525988da01095e377d3f0159eeed36aecb65c
SHA256f618e59e4844d26bb53ca7d9d9e9b0188f548e92cb88d09a036d7104d49db866
SHA5124123fd34132cb082ee4737e69526a742fbe9c597af40e6f13d731471a8f56ef9aab4ee279407b48afb0efda2b54d5189d9172d880ee35bf2d2dde3c4f2328d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a823dc96fcfb89516b80203b3d18131d
SHA120897a4cad5fb5df6c1caf6a7693d78a21b6ae5c
SHA2564d74a91b0551446a54545b2bb22b82cb8e5c3f2615175e376e23cc45681972cb
SHA5121f2c63876a433ee660c7bda6d4e278b5c212d897835b202c160cb395b88550d2871862cfbd701f7609b8ee275edd9f26808b1d663e12ded98360362f59730676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c390c977b411b80467323dd4e4d59a2
SHA112b8f3664a059b6ffad44bc31b84f22e17b9d7cb
SHA256bccbd1be3d8cf0026fd841945a892aac9d41a3057e3026676b960cb29ce0d363
SHA51299efab490719fb55cab846197d1e340b4e48eb9526b5ff4e8c0845b26972005c673384edc919584faad40c0bd8d405696efde521f16762c380ee130197866057
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54be8bc8ee0dbca79b535c64198b57e66
SHA15e521681b9e04522316d643581abbbd66c808bf2
SHA2567030c9adb4562a7758419744c68db2951abcc8c68ae7ffd22c5147287a3b1127
SHA512fbd18ebb0fbccdd5142a3dcbce86110dde2369b0ad99571691f9c7d09ecccba3a2a69bd2ed373c34949e7bddb1dd85ce94eb9ff28219205e5498faef28a9f3e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5023c23c564972f7f34fab395e460f03e
SHA1619422859d5239e90e3b81ca305c6450c7a7b458
SHA256f1ce0d839d2a578cca6d329a9ed8c569c5fb3592f0d3867999f32fbfe6dc08b6
SHA5120ea5e8fec0dc40d1e20fb8eaf0e19ef1e889eeae02856f3659d0c04090c7ef23b856998e473fc05122d8b173789a33de97c9067f4f83d1c0dddc24443a23b281
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b238109cb1925699d86a4a4df8ddd395
SHA1250adea0065fec2742b99584ef7a8c5ee75a5b76
SHA2562a5960af43e1c972acdfd7829d2134923e87d9f981a3afbe8f8c6ee610505ffe
SHA5128553d3bbdc38800c7ed8a315eeb7e948d6ac446830d3ce6398e4f64b1c8061f988a9a5c3b149ec84939c1a04cb0e8075dfac9fe4010ff2a5e77529dd8737aecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e09885170aed85102b00b28bc68f8d3
SHA18fc9ff8ac09efa99a91497e288bd9b481626288e
SHA256084ebccb29143e2870ca3821634c67ce3b5aa1dfe9bef8da6f404f2d7a3fee59
SHA512c6297f28ed1b2765b28c7ec4e0531669740c40f4ac9da493d5ee89c9bd669af02f66b8a157ddecce375a9d5cecec10e0646582641cc549e52d92bb3d76481206
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2cede31324dab7837b44f04f0e5e05
SHA15851d2195471995b343a4704b6950f1068b73626
SHA256d7b28b6c15d0a4f4ec84b5dc20e4441f380618dcb7c1db300477c08f75634ea1
SHA512a14d00d6d3b5adfe21a64bb612d7bbfb2b6407f6a88804f1d7ef40190323abb449e64031bf06ab88223cdf9520bbdd7a19ec6fb8c0166adcc5b7599b3060957e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5490dd2d569c73a00102824d5e81454
SHA11c09e3bd271e26e9fb2c38c3ed26f4a1da811453
SHA256958c88e205e82de56a1c4d7d4f58887e98b859e50409981c7d44b5e5242a51a6
SHA512c2c943f571f42ad20f2e5a36afd7798f92273c777e7d8c90e4cf83f8afe7fec7c4134e1bb2d1098e406914edcc4abf44cda59f76a617fc78b896db8a72f87991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c10639e6cf318cec1df13558677de38e
SHA1c3e597ea3f9be919e408de6e6e869074a7443768
SHA256a7797bdf0530ed4ebeb852ac5b95a20612281281a8ccdd907fda1681db3e22ff
SHA51288ae028f1fa14a60244e6ec1833666737a1c9fc50860accedeb24fdfbd4d5f9ff37471068729c499fae60c6fcd7279f98f809e56682efd370e2a492eeb133b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564055a67f7d9a9c46662817e32740f11
SHA14a244a14aee6b01271542856494d28784208b81d
SHA2564af47724b9e490593eadcbe40c477349730cf952a1b0c9135873bf4cdd05213e
SHA5120da209639860e606fb95fe3a1302c7e8593e15eb18cecfdc02c30b2edcf4566c90cc8697316f0b89bda52e68fa28e942c5f29b4dd706dd33a1e4eb1628842fc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e62ebf2f0ee009ad089a195bda04adb0
SHA11b3160f40368b4c3f8b2d0c92ac85112ba0845c8
SHA2565ce65d744f0a46abbcfb30da55975200099ab7fbd9f2f8692e9f25580701fc60
SHA5128990a3ba4252ab44a3055f664d3d27ba9d46593679ce88405bfe771071cfff0d5eac1005217e30ad975d2a9e436040e6cf18ea4c2e7c7ea81b852b86d209f1bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a49aa2a2160d70f735782dc681c8883c
SHA16f94ab034d52a01c2082e25d40cfe27565079091
SHA256df077ba6275b6bc99a414d8ca1d288e42ae28adfafd3b2cac66a97b250cb924e
SHA512bbabd52f8a94eea2fef1d4db549f9464b8746b2ffc6c512a2c1eb1514728d7a9058e5a1cdc574bfaf4a8126a19702fba1f0a2e644abf1567bb5b943b4d10f9dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caebdaa6090058d2c8c326e245377405
SHA199f0d4b1ff06c07d7f23ef4821c415ba63b22041
SHA25640f6742d358b6d6c5456643c08a42c5dbc3d5fb8d9b6585785f3d9d31be21897
SHA5128cdc5a03211a97d6aee680872b888a63086a235543b346faf8add4dd777610203a7a359233536795d64adaa8aa1d2d67101591af0292d7ffcd4a8d82f88e86b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5775780e472e695ace2ca2da662bf1ad0
SHA19cca8ac5788fe3ef6d092ecba932966a138aade7
SHA256d0934c507dab1d2866d4f9244bdfe50a98962dd680660387e5bfbeac48964c2a
SHA51273b57847d573ff31c8ccae573c2e602c820497f91c5251ac45c99f3f23a7f5b0adedff3fcb9e03ea6613fee82e7abab7a8aeee0c72db3c77fa16ac9678449c0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae0943d76ae924f7c75629781fb8ab0
SHA14008a79e12704e4a2996ebebe86928d047f5464f
SHA256f98d0ed403de685e9a8957fcedaf14ab052ffabc5240ce32fab3cfe61eeec4ac
SHA512b8e12c68a3d6bc093958f5e735b9f6c04661768e7639a90b5ce7b30b044c0a2a5e031733236e3c2ea152cdd6307fe62d05d4870570d5c39e4a415e847186c703
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55eb1437fc855cded433d47474a130f52
SHA1f6411c5ae571cd0bc11b10debe940c0fb835dbfc
SHA2565260fe79674d2da4c86ca1a0c4ff26e5d47ad82a412018001db970e1af0d674c
SHA512ca0b9b32511f22b6aac92701cdd83ccdc894a3f4f1f4677c776144ffc4c63654e20e81db43c3dbd0c418b5edf07d56533b200b499be17c5421efe971bc1d8f93
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b