Analysis
-
max time kernel
67s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
4d87c4c25afc72a7f0ca7dc319d1ffb4_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d87c4c25afc72a7f0ca7dc319d1ffb4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4d87c4c25afc72a7f0ca7dc319d1ffb4_JaffaCakes118.html
-
Size
8KB
-
MD5
4d87c4c25afc72a7f0ca7dc319d1ffb4
-
SHA1
d97bac048974b19ecf6e8dff13845294f97f9f06
-
SHA256
48f80506acf07eec581c05a7c8bf31825d9386a98f108b0b13029c6de57345d1
-
SHA512
568e2e26b144102a5f7cebdbaa691ea54625133507343612f0b12ce0ad16e13583b68b408402af2d0db23df4324a1e403bf0b14d6e874a0e854338c54a464160
-
SSDEEP
96:uzVs+ux7HqLLY1k9o84d12ef7CSTU4zfIneX8qH9ai+uNseijNi3ScEZ7ru7f:csz7HqAYS/vvHSb76f
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50b0fbc859d7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F386BD61-434C-11EF-B228-52723B22090D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427280193" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf7100000000020000000000106600000001000020000000dc128b8d2c8116ff69de493eeab66e77a0b076838964dc3468959a0b18935229000000000e8000000002000020000000400eb34fe33f8927eaae62ba9552de0aae30f3db9c263e6978c26300116e2568200000007eb0f5b15a1ae904702ff55bf1f1726e50ffdcdc533182ed01114f9e84ffd8c44000000052a53b57deb3c3dbced0735b0f634321c4a2972d1e582b4570c75c825cd1b76f4a55ffcfbcef755059eae6407adbca491f949de950b9783ea4ffeddb0cc48473 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE 2428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2428 2208 iexplore.exe 29 PID 2208 wrote to memory of 2428 2208 iexplore.exe 29 PID 2208 wrote to memory of 2428 2208 iexplore.exe 29 PID 2208 wrote to memory of 2428 2208 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d87c4c25afc72a7f0ca7dc319d1ffb4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db284efa2e458b24c8fa7648fe30a0fa
SHA10bf9bc3c5b4b9b317edd9a1c6f40c628220d516b
SHA2566bb1876963c5b496311d23f254a4b812f6de93d9a4e70328e40935438d845f6b
SHA512b6cf9afa54202fdae1bda61d34e07f911eafdb1b38471829ba5042a0fe282193bf925d8e0d237f8c55ee39202b2b950374c34431d922c253cf1a4a043d69ec1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518390242b2c7e0a3c5eb27f0cc4732b0
SHA184a0e6c3718ba934f19f1a379c7998a1d9f02070
SHA25608674f9fe0760bec25447fb9f858e35007385f0de257a866381241f7b95317e2
SHA5127422073d5ec345fa9dfe30caa306dbe9e6b008e5a7326ccbec1ca8633504bbd855b6defcc8192fea11116f69020e61b5cebccf10e4b42a5ebb8a73575e76728d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55bc5d7ca2b07d802da50d0bca8450e51
SHA18d85db2178585cd43a15486429afde5ba88006d4
SHA2569b08a4cee17a80ea759059750fb2b95cfddd81b7cb14d2b7adb8ea50b6d98e65
SHA512c3dd19a219e3abb31b0d923e928e8e01afb80d0959a40ad37301db674915043a3976156a0dac8953954405e92f665ca5bc57dafda54a67f924a9a2d5e767dc00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e2591720fce94b09b5a0ed89fd1badb
SHA1649099534795f807248fe5b1f8bd9eac0407a5c8
SHA2560343e9d4c573a420ec31f851f0583c4926edb1540f6348ebe9bbeda449348139
SHA512c4cd420014489021b896a78955a38ad7604e75aa07ec86e3915f183d8441088f41c1bc4997bcd165d7a95ae49aab103c91334494d0bc298cc84d64ddd7604c47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fcc4f88c4d80b8dc9b6601b9e7b4c9dc
SHA1d692f2e22aded5317a34142765e4224253e594aa
SHA2562f30945c7a389ca4915255492fe2fb1f1168385fea7d3459593e9980b854ad3a
SHA512c8a4a5873e0b166e41731543371ec8369c976f8a37dc069506a4ebac7d97afa4a56cdff4edc9954baf1457f12d3579ddd9461ee4523cae89a48a40c9d3dbcec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58afcbe17a0cc36d77e10062e8ec6f433
SHA1d147b4364d86c6479e9cf495d47621d2f00e80d0
SHA2568ef6a9c189e0a622448ba4b0999834d33bcaa0f9c8814a015ef490c4c5577444
SHA512a50998076bad2a248e4300c3f03737052805c5517eac743ab5901930b54b90145eadfa70bbfc534260219582987042d9cc0961aff602e716e9508f4c28e63bf7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf0654868dd3959125d0ddf3f73274c
SHA1b0767f735287ee02fa468f60872ba24cfae66971
SHA25631c8c61d7fc87ae1f2f6839a6405e4fa90ca7c62e4b07f9e4ed1b74b2311959c
SHA5123e01be37097daf8ac1d50b1dbda247201c091e02d8235c2e80a91b45f3242a692798f0f46b8ac31c7d7f1606ae2945c1bb51f651d7a7e822ecf7a88c9fcc3376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a20fc2d0c5511233a8fe2e6688a7cfc6
SHA1b0b737986a09e57b2f338eecaee96cedbcbde9c9
SHA25692c665a900be5ccbfca7cbb6c761049f0b5f6b3fa06a31a57ca067b646c44216
SHA512791b230c8a6a5d7e940586a24d7b6eadba1ffe7fbcd49a582cd5a864c9c49f87b8607a75b341616ba5e106089b6efc0bc7366c59f386cbe6864f0a50582cb08d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad24774288bb8bd63d2400ea7eb2e0a7
SHA15cda0981f16def42d6fda33e3e86fb230a53b1ca
SHA2568d00eca225b1af64bb5148088923fa947b082e81088dee8c4d824cf8de3b81fb
SHA5125124e21a2313d0aa16af14ab4cfc2f894432f7ba2506b64301be615f5bd0964e22262c1532b00fcea0176e9f413e0176b1e15685a2cb5624293b940eb396965d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce31fadc81edf01959cf231fe798d2a
SHA1282556ab16d6444abcd56f0227c658ee2f8455c6
SHA256195117d5b6be8e38accbff3f2fdcfa25d6893670fb605821a124a61c412ad6a8
SHA512e90a74bcb00338d2dba41b36c07f6a989da52e1ede04d567ef2bfe7570fd601de5993217def2965c3b3f5dc32a3c71a434c3e757e63ff5f972f92ee05dda2f17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506d80b6843c2e56a5378aa3bf65276a0
SHA1190a24ba68a573153bc4180ab3a667b83042025c
SHA2561c121b6b9dd2c8594cb5bc0bf8d727e27e1baec133e2cd3c457c4f62bd9c0c05
SHA51230d80831efec83454a21ffa6d46b1bf8982501b146fcd398b0e9bc755587ca0c6d02d746462d3acd6d7ca575219f8101e980b29633c0dd7c2c63bc0507eae683
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581add8963519188387621196eca40d4
SHA18ff44bd33f19ad8bb96a90290443020cb0cd11d6
SHA256cdd710ee43e4fb66684d2705efc2422fec9f09ebd68b45838ace7d552cfe434a
SHA512843899834a147a574c3af57f8771b3ae5879eaaa38f5abdce7546f6be206dda79f6bb94594b8a0c52d7f57e1e37a296eddcd57902b17c273a5815dca63d513d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508563ecf6181d1f74e84faae61be531c
SHA1e9792a7fba45fdc5d4aa464c1cf2788316f129bc
SHA256f9e6d439a87dbc905ea515705ccccc4dbd164861d15d9f0c6c1a36438b5f3856
SHA51270675c21a791137d2a4ae67af62d98e6cd90bbd9801691ca755a154fdb9cc5d99799d7cd835187b4ef551ccedd3633fea5295badb8504cde6a24ab8182b82566
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a13a43127c5676fef12ed67a92277957
SHA1ff8d53b0334b1f58f50f1bcaaf9125c13de5af3f
SHA25600bb73882c4cc976bd23ec3e819753981d7ae804331a7a974cdda5903a1b4a4e
SHA5129df1cc7c1875b32fadcbc5d8b7d8a9b55375dbbfd821356a131e1cfb9b6ab1ca0a421b293057ad6decffbf899d5c59cdacab1434d54300de83a0e1217614f123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c6b0aaff58275d84a6db7f63c81b0d0
SHA1c72e34f6927b46172e2669a6911eca3187146562
SHA256381f3c73b3bbcfde237aaf2d7e41ddc0cffa61e34261a57fa2fde6a304327035
SHA5123c88800e13f3891d936b453b1308a727f3c7f8b637cc66954530f4553e3dfe39c6b1ee056d8dd06269a9fdb141eb18069a484fe9394acdc9d17c426088ec0f1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5498424584a80c07cf9caba301ec5f8b3
SHA1edf0ea793f48946d1f6cf77bee15555376b5ebcb
SHA2566287aeb42f42987a2f946ecf6e4c7e43da4fad94f226278e58a4fc00856ee263
SHA512bb1eef6cd9fa641252b3aaf9ac4499bad18aeefe5940c8a7ab81495c744070f01b9189be6022f513778593956ed8359e44dfe5144018a9d6c7951adbf9146534
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5774b4d6184d04c82bea3dc3385029615
SHA1aba2f90fd05041aff92d77b2686d5b356ca3a9f6
SHA256e30b949acf10c6ebdda4040115449001db1fb7ab1c33360918c4c6257f108736
SHA5120b837daafe1af2aa2feabc28f20299ff44e9a856b3f8e99ea734fc836727088458c73dd7e0836fec0a5dd9028ba3077b93a09b208b804bc4e17f49f9d8ea215a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3a3b82d6146eaf3e86557b5a85b9678
SHA17e4165c7e0406dabc94d1b331d8d66fb9803d5f5
SHA256fcf94723cad119e3d7b981ff69c482d90db8122cc601c49de92232aadf103f43
SHA512e615df3660565a195826fd7d363948cf43a9a8504578b9c913e8e07a932a537f24c40471127fea1e38385a49f1e9be5e7fd8537e2edc7fa6a8aa324ed283f1f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb40698a8a542548801b5746fa018976
SHA1714a3aa21f8bff178461f5a4c089a6787678b258
SHA256fc12f8bc4b66684bb85ecaf2dd4928189b5b650da0a8a1d860680cdd7f90c1ea
SHA5125acaf5fae6c240e49bfdc2c680a42e4c6c0edcdb92dc4220b540514ef3deb69800685abfee43feb43ec9f42cfe5625b97d6e78a3a615f4896ac5cba09fbb3e27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9d50858cdb45487d404a1cd4bfc08cd
SHA1eb1a2a741cd836fc381d3bfe8b3450f33238d2b7
SHA256590a6f7fd89aa7c1bc01d690eece7eda39a6e213700e784caaa8a22536bd23f4
SHA51239b4b675c98e5fdb21436c5f2fc80ac145496da249555adcdb6c709eb79c8cb1e797bc0c8680d196912bf470f14fa58a160b9698dcf596f90be120cb008aee64
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b