Analysis
-
max time kernel
117s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
5dbe60a4f96323d0db0b129f09320571_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5dbe60a4f96323d0db0b129f09320571_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5dbe60a4f96323d0db0b129f09320571_JaffaCakes118.html
-
Size
6KB
-
MD5
5dbe60a4f96323d0db0b129f09320571
-
SHA1
ec25e93d3600b9b5ad9d53bc17abdeb60b9060b4
-
SHA256
92bb20d0760562a0aa6c758613c9b9bd52eba31c06139e3876b9796f8a94f326
-
SHA512
2f70a2e93546bff371b1d70caa6515a1def194cad89918fe2010af195fea4ad1c4030c2e8f442d83a197de6f5d3441aef3a1e062f76691babc4b868bf3e54f7a
-
SSDEEP
96:uzVs+ux7WRLLY1k9o84d12ef7CSTUqJ/6/NcEZ7ru7f:csz7WRAYS/h4Nb76f
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000cd748cc47ff8c39a5fe1544db769548a3c08b2693ed7061dbfb5e87337d9b0bd000000000e80000000020000200000009cb5b0f3b7bdff27c7720bf138e7a158f9d84867ed441b7306db2a93b0f0b4c420000000da75d7396892df4ac890851152fe18da1fb4cd682c5b1bf9cdaac603606df55b400000000564584ada229fbd12a94f35c1d2a3996ffd6d797fe275af077b628926348b417b995d42f3777cf0b663ab87ff8c2bdeb087281b0c116131c8aa980031054d40 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3FA60B31-4616-11EF-A0C5-EA829B7A1C2A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427586552" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d0ef2e23dada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2248 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2248 iexplore.exe 2248 iexplore.exe 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE 2400 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2400 2248 iexplore.exe 30 PID 2248 wrote to memory of 2400 2248 iexplore.exe 30 PID 2248 wrote to memory of 2400 2248 iexplore.exe 30 PID 2248 wrote to memory of 2400 2248 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5dbe60a4f96323d0db0b129f09320571_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2248 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cf4a3919b7cdc1967fb256afb5d6578
SHA161b01ca410b710e075ef6154a520ce9e1ef1150f
SHA2566fb96027c27f10ec3116450dad7f28fde710419b9195e4dafdf2d3b6c4fb0008
SHA51255b83e3da4afb587f190260e9845c9ca5a1be7f2eef7b15022f3a0bb7c28f8dfdf5a5ad0b6ae47fddf20e3ae37c688197044683cfbcac7a8a89ebe55c173c4af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503c53823b40c3df9786c895a6a171510
SHA19720e7173f89eb5409de36080a03686e128b9541
SHA2562e8ba690ef4299be755283327fb2c8bfe1bfa9ee98679d25024c5a42a35359d0
SHA51288818da89c5ecb7ef51e0a3d759ee9e1dcbae5930d567cc740fe82cb0d622419e4a6967eb30dbc3d633b1ac352ac5e79ab67a8a1e9b7c2086abf3f44dbf9666b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca5f9c468b044557d5ed401f29d37f3
SHA124c4e200af9eb8801793f51e7666f1cfb371c0f5
SHA256f7c9f0e44f08812189d97d1ec458b9d868d4a45070a356af6240c5cb39fa128a
SHA51277250ca712bcbd1ad1db6935f0887aac7ad6a213fbfd3c9a97aff8f827f1db39c07a908c9a5b3d6b5030a75521ecc95853735d345fc9a0c5aa8dbbc76bb76e5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51363f23aae6ed2857d67988b9c7f2040
SHA1f33c644a4b0a411158fbcccb170081c66cb32c10
SHA2568caeba3f32c1bea0e20e541f5abe647f3d0fc725888bcc33872269e7740d402e
SHA512cfaa9f61d571b126827a2bb5d2496f3b8c3e9ff8a89e9a3d9e01a4e9c23ea59f793e77ae35d8df8dec0edc9d9afae3a6ab5c35f09017813398355ed4f3417152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5667c3e3b15cec35df42d9614eed8c39d
SHA171195a37757fbb33476c1df44cfbf6149e23245b
SHA256efb00ea0f06ed3776104139aca7a7fbef48a40a268672d1f2bd6d5dd6a76040d
SHA512306295c261fa2be2b4ab275cd54ec85b8ad48d0ccf89003d73d7f2eb1c543f5519f0437f93da8ffec9f997b0d33399465d6823537fbab731a20a67651e6c403a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e573bec60e6a802987de20d2c16dde7
SHA14e60f0a41f72867a50e84fa172eea72e2ed49780
SHA256c8fd30afab007b7c0a9f61848a4bed80f45da06635785faafaf8f155ff312c47
SHA512d81dfac01e4c3dafd600bda84ffc13f6027de38e7fd2452491c555861e845a1f3728f33673dcc93e3ce2cc98c6ded349d4e7afcfd9b3606753bde27d18e6e290
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be4d3058eefdbb1a33d2696a063fc21
SHA18d6a7ddffdf5a3dc4b18536b80ca0e2b396f759a
SHA2569affc86fea0c7d825c8d1f3167b7d41cd882a18dfebb7d9fbed8c08a491426ad
SHA512eb769412aec3731080e5c5fdef8c3a181550664b8c399815a47ea7dfd06ab5c122a17ca1bf29fee8e969389d9aff98a86638eb06e5d5b4ef6d84865b9f204e16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be33f3953b1a36a17e345acfdfd687f
SHA15e1589bd1479c30d0829faf29b2075a8bed41485
SHA25611ebd188d92994933351a9543c94d09bee45148035800ecbf50d20cb7111c403
SHA512be8c89064cb5a753ebfae4f516e19a7de12aac8baf4a153815517d62d7f11103abe90ad0ac15ba9b7b1c0b1e9b9a322788f47d5eb4697f79d6748719bdfde02a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5309c1f4f9ebec815d66addc8009f871f
SHA1d172cd71006e135d97af886b3a02e2a71dea7454
SHA256b258ff54a8d8b6bede557aa7de6989e946c3cba5f9a8524965024a3e77b151b1
SHA512427cc88e6f8d07f9d018833cfb4bb34f99eed19704cd9bee2054d3eff01c0bd3e78a8f1c714cbc39531993d4233710f95a4f8f51edb2d379d408fe621a26c0e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5837388b23d0ea9703f65ee32ed229702
SHA10fef5c93effb01251c1baa299f148e983b9a8849
SHA2560073e6a3e02cec8b72f81867246917b827a38f3ccf23ba7f13f02b7be2cc63cd
SHA5120897b955c13e9a9928ccc752f396041eb1d244136e914059667a76201be319d279af8770ee49981ac1d0a336930f3622390c42d4c27fc2c3a84cf0dccb55317b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5870c23491122ec40a402532f1fe06285
SHA1f908b395b573ab27a1dff833e0d71a37b22bf4af
SHA256dc65d913a7c31f64170fe931df7d57ca581aa55248fb4cb5b2f490b462e46687
SHA512f86d1b9c73b5428bf664bf73787272117a2dd3ac45f9d8aaf674d4fa1e18bf26dd286bf4b7b98cc334800f690683912188ddb4951459e325d1de8310d2dc3f1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53562ebd8fb83733f920694e5989ce107
SHA129d5e7997b5dbbafd8b0023bc68ecfb003a8f52f
SHA256a70e2619c95074d51f627a980181e360a3301007d24085f4d7ea0c0203cfd1bd
SHA51209cc4045d572a576feb429864a4fffd650b845bfdd13bb0f8534ab0dc5903204c0a669319ffd9747f0d697595defd7e24f654023c42d3ce051fae758e700f12b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f5601e33af07c2c077fa1df3e8a4b59
SHA188d7a59e06dd950e475b11e2f3c26725d867c1ec
SHA25614528a217e573206c6ad733438703e662797d43bac58d5cef15ca2bbee12e149
SHA5121246ee636e9bcb542e95330ce41c4add4d580a403d6af2f6c1c2fb6eb395b44fed1256e136e87592eedcd2b0dd4fef884546a11d5656c7248e6eebbc5d5ea53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c5fa2d0d3a1e980868db56f35e844d4
SHA10d4a7552e33a31e930b9fb5cdf5ddb6ce972c377
SHA2562458680db5903d08130475f725039ad59ad20c8bf2d24e1a7621516c530eadf5
SHA512da9f3990328ad518883fefcdc4d3a5ea3a6d83d0640aa8d1c8a2456d838dfeb6ff0aa1c7708a6378d6a48b03194d218896a658aac06965c4f3a76cc945e3eaa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532037eaa1ba446fbacdbfcab978b3e1e
SHA196aef668a85877a518a650700153b93ba042ad44
SHA25604e8497fa90547e0a1410e8115af52005c03fa4ed129717a2909554ba9e62366
SHA512348928695c965c18c2ed1790aa06b3b9ca4cee13fc786e7f94c67715922650d589aec8313575bd583721845970fdda8424f15e55a3325ebaa2b5b87132c9a8e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5523f075b71d341a5e3a91df62584bd63
SHA175d619ab0b2fb64b839b6b4bb8d8dbe3522e95b9
SHA256b49aef059ac678986a61d60488e76aa220f63b8b8d881ef4519a3d99bb30f158
SHA512dd014836b12703107a736418ab6db606d65894c020209745bf30183bf43a9868771a9d8516f2a0827524ae8459a37ae45fb7cb2e5968e7d5e49d5769c5d4facd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6310a2f43ddf54f63a82efd880d0ab4
SHA1fdbde6296c48393fa7108813d107e5d060a8d258
SHA2562dbaaf0be3e49cf93146e296bb3c378800760dd7b10e8e979578d32623e2c6a4
SHA5125eccf6484db183056ead55defcafd3620be65b7a8f736031e292abb0fd3a228371bb723c4e96e7ea77bef925d3d21d05137f54777f3cc005bdfe55e5ec48ddbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f41add4ced740d5653d1b052cc16fe30
SHA16e221ef9ed205caa6449a8c308fa7a50917a1585
SHA25677438d8fc827ff00bd614051b44aa813c72f341c5063c6585256e2744a90b873
SHA5128c6a14e59d8bd36041da555bc7cd6bd98bcb075a58777d490283aa5114e18fab213d9087edbc01dcf0b7ff10ebc5802cab0a5b594311f6487566fe2ef345304b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b