Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
4c0e3120454500a1bdfc4df4b8f28975_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c0e3120454500a1bdfc4df4b8f28975_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c0e3120454500a1bdfc4df4b8f28975_JaffaCakes118.html
-
Size
93KB
-
MD5
4c0e3120454500a1bdfc4df4b8f28975
-
SHA1
5ddb25902cc55d3fe6c7dfd36eefbedd8b3c131b
-
SHA256
aff4ad4cddcf7f075d4570a02ce43cd43f43f9ff903af22ccd4b0445de00f1da
-
SHA512
53593a53c8bac229d0795fd1bc43796aa6b699302b3d61196ffe250402f5ac26582c808f8f8cec7dfb18a5aa75188ebe0b4b521067ef09e9ac848fe79da13415
-
SSDEEP
1536:yYWOSNH0idRtxWVTnSQ/9Nseki8GtzTR8irBEaEkXLETyMTRWtEkZwoly/7bUWQC:yYWOSNH0idRtxWVTnSQ/9Nseki8GtzTI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f0355100000000020000000000106600000001000020000000b7ed441bff7933a90f0c1fc26370fc4ef33c4ea2dfcef2d21dd48dd28b7e3491000000000e8000000002000020000000100ffd9bb44def7f036ffcdbd24679f67aa8a40ffc2fb316f72596ce3ce8d14720000000728b9aeb3cef0eda0ec5f78757de7ec12a3f7a54da6aa6dbc96ad25ad74cb684400000001b50e522105d678e1e944d39f1eb990e8bd92d2801b9b154209f1c2bbdc6180a4e28c82d05ab8b3e8a446de75a84e348d91fc6b8ce19048a9ae21b2c1aa0ccce iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427251435" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FDCF9871-4309-11EF-B0EB-7699BFC84B14} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20053bc616d7da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2232 iexplore.exe 2232 iexplore.exe 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE 1652 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2232 wrote to memory of 1652 2232 iexplore.exe 28 PID 2232 wrote to memory of 1652 2232 iexplore.exe 28 PID 2232 wrote to memory of 1652 2232 iexplore.exe 28 PID 2232 wrote to memory of 1652 2232 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4c0e3120454500a1bdfc4df4b8f28975_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2232 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b97acbde06eb15c82c038d1093e1352
SHA1c143d41ae51cd9c0015caaa399638baac49c0860
SHA256df9786ef7759fd5ae55aae1c40446afb77f587809746b32a27070938f404ceec
SHA51264b3707c5efe2a8f3d882062f1a7065a8a82230f224ef5920e62726d1a7a0a327d0da6ef25e9df6eee9789da07572bd438bd672b24265beb634df4efa8582d1c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517d5be2bdc662b4c28d456ced1de7e57
SHA148e0f57c0b974edd0e2e1e610b31e67f5948774b
SHA25630c2580813df3119bd49e60cf4ccee7c859ab6776815921f3b67d1bb7073becc
SHA5125bfd64f0316296868e9c242d71a48c3d91cb9aabfd92f16bbbad3c08523d59d7b736e28d20af56f83ffc9445d802def71e1003cacce35633d284ae63588381b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12d7a766b147bc57ba59b7d0b59d528
SHA1fc61f1d6ffe0cbb1a02910cd35f93e68ed355e8d
SHA2563bc7eca4bd9b2bf8dd7e34f3f79f372ef20e5776bd4b01498cbce8ce0e85de40
SHA5120854624d4b4c35b48db5357afb4302050dba67dc8e3c5ff7c6358e0e80eba20757695219e378cf830d9ab5df142602fa3be4407da7ed67f93bef2059083d0ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a252a85b480a0a33f15c5370d94c963f
SHA13f682b8acea5c379b3fc35999b0e76399b1e54cb
SHA256c043cceeda5f45f9c276cb843e88477d309a247df70db76037ba3591e04cbd75
SHA512fe484fbd41e7cc1dc49a4641f2261e4f11b8f894194eee7fb06dacfe8366c1fd013a52babc8c400a1c11568151695600cdfeee8c6a95b0522319d15b2f84065e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5105b9e17a8a6587f40c4b1ae9e14d44b
SHA11386402737ee49481731b264d8244a66fe530b06
SHA256f5d5072ec603b85392a3398e855d80c58f39aa1a469e08e8e6aee2fdcf110f08
SHA5127fb4ee77c73b816dd082f645571a240ebd7c5ae552941b3710e33cbfbe604efcfc42ee42160192260071688414e1b308ba1fce886ebb78b0d74ad4e6683e1063
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5221ffd4ba51201b844d39f982e426b50
SHA1d9ec10a7af55660920c7132b1570e1232a08b13e
SHA2566d9deebfa9163a32efd7872845f4dd64c5eb8e995b7919cdd5a90506b1abc238
SHA512399a7b4b5aad307af13951f67392eeb97a880abe0a16fc6c8f2b714d7ba506cb83b550f3274dc55f295e7a2db14c1b15b7ecb340b5c49150463cd6158e1beac0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58564ae94edae2bb9272583bead422b42
SHA11ca83a873baca9a48edfd78dbb9af2f41b5e37c9
SHA256a4e8422f9f0a5d0b5764878867fc33e543937f338845b1a3682ca3e69eedcd41
SHA51244d343868e0f75afbe8d4ab717d092808221509526961e0a93a442cfd29008344d9bc1c77014fbf59dbd916200c133bd09f4301132365a5fcbebb6a032324288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d761ded923709f8962a47bf52cd3018e
SHA12dc67c511d3e9acb2be79b49626f2defa9dbe1cc
SHA25638dd1df6362c98523ce3725ffd4d22ee0a6140b4d0e1ed5a60f4e053eef6c5a4
SHA51273cf989e8d81ed56a833fc684eaf0a7995a1ab2f001246b06ea357724447e80b0d4840016d5cde6a31c561cc6844624e0b77a7452f698200d40d3827a61ab6fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d3806e8af36901d4fc9c81602e233eb6
SHA1913c35c4df3ba9c3dcddb186912ec2d41be824ac
SHA256e43e7501725f54f3c2108eba28d8bf4aa7b97ebb791470bd37c1e58adc9a6668
SHA512d6e551606d3ea48aa08ed2d00d2abda25bed8b5e27588b543b63356ea3a8ac041f146ec2326cd74edb9ad818fe27ad23b753f6f976f199aa7a0e8514f9ea1e66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fedb4fde182f74078d0378bb1d3be719
SHA133856078e0c770899fbdd84f185faa516b4306ee
SHA256951b545d6a659b94356f272079532dde67ee4e8a7ffa8a96519c28fbe2fe2869
SHA51295282421dddd33b27bc43197bbd5e44c48ef348a77d883786c542da4954628b3bb3110a9fd919daf9d25627d6eab2cb7d66e94d5c3672bc9ee9c00c44085e550
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8c467d533fa8284eb9cd9080fc53365
SHA146a277ad24bde730f5fe32b53aa958f16d3d7e62
SHA25655189cb6faab008f46d1512f07fbd9ae2bf5c7422b718a0931bcf28d1a2ae6d3
SHA512ba373a8c7fe26bbc9d1fcfa1c0d7fdb65986ac352220934f38139fe4e19748f8e2f0cba9b4b4afb9249a1ad7b6a2e41b2f2f6963930772290189884cb7d2441b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6f766c5f94ffa1059eefa8b0146324f
SHA1b79f0a7cb7af7d1eb824a2f1f9771ba3749feed4
SHA256bca9f21f84a3106126786780e73935433fd1ebf075c7e5b6963d30c1b32b1af5
SHA5127bff11b68c285bcae8031c2164e7901c7d9fc8fac393db2806255415cb82d53e813debde47841e46b138c2ba43ee49f6e92d059efa012d09799e36b2595a90ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc353745cdc1e32a01264883b41828de
SHA1edfbcf38961b3cd50e92628012f5c9fe9ab46c21
SHA256db407cf9aed7b2b2fe304b8dcbff33ab7ed05b849a79a9f7065a7aa5ee459ac1
SHA51283d09943f90f488dcb4ed392fc50ee24ac678c1434ce76439e829f4cd7b1abc807578902d0ccbfac3b1e2182e41ab764e816907282203b64a23fb91b4cb7b9f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3b1a33e4d18d27524a097205646b39b
SHA12c876cf98cf66824bd13b5e1bb8096a7e07ab615
SHA2563f06e430c304559c39caf4b4dacac770e05d964b5138f11d010e39e8e8b2a4bd
SHA5120ef4643a357c704dc6e72e00d0aadece19fb96fb80542bee98f908e6076a725cc90abbe4f41b3851b51a323988fe74e9526228e3bd9b954d830696484754d518
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6259b66ca573cb7b9fcc001d5607515
SHA10c7211fff2bfe32acf5b02bbb7efc6b0f1f4874d
SHA256a5c922166c17bf5792051f33c729a322f73026825d086ab1302be6e5be8c4b1b
SHA512c49a5a312b169e9ab043d8aac021b546e6a6bf85a23b5e6d763b43f58ade07cc01e9cfd60abb995f8c7117dd4c28ed5715636ec5679f5d674824afb573af0565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ab57ef2cbe58cc3ee38e42da7fa2ee4
SHA16861abdb3e6c42b9fe000a2adfd7b36c1386f8d5
SHA2562f6cf0d98531822e534f3ed2554cceee1152107370471898e1a593df5cd51946
SHA512c7f6fc87212df854849c9e1d91ed6bd5b4a673cffce0f130a5ff6177f4ce3b2e0e7d9aee451b4d19b8294196e22bafefa32aa3e47de6541797914fc28a3b1090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555af45248a3f9c5cd45633b533a24162
SHA177a5e98d80cf2a331668b06cda48176277829bc7
SHA256102ef10610f8e215b1e3b09758086ab01f877eee2e1338da8b8bdb4ce7dfdafb
SHA512dad997d145b2e55192fb7015e925a79983b50868685bb52101b16536bc042b7c7c15399af91f0d01d2d15863927bee5a6211fc095ac177562c45facabe78c3b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c7fb1c640564d321596b68111a8d538
SHA1a975b6aa2830d849f82b5cb7f0c2259e45c7c404
SHA256e5ca8bebc79b9eb4bc56ca41617c46a046139cad9f1174d1e28767180b20b531
SHA51253e1b8007105c5d6d1d9d3ca73e624fd75030f2264cba96dd189305f554ae0d14aa8e0714ddd3f13bb1542eb8a58c0d22730a4999bdb65e154ea4336505c4f73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f4ec7797e758c922a4dbbe17abab1c0
SHA13d36463fdf9896d352e64ac53103ae4968b732db
SHA2560fc554a00fab2a0e586b0f15d3c712c5584b2354eb783542e123569c04e397bd
SHA512ff110d2a379c8d69cac9100b8910339287353587b0438f61b5c5b83c27d678130480b304bfa0ec3843b1def690194462fd4cdca169e55ccd28dafd793e5cb341
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b