Analysis
-
max time kernel
119s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
5dec60e920e320c50332e1733cbc7cd3_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5dec60e920e320c50332e1733cbc7cd3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5dec60e920e320c50332e1733cbc7cd3_JaffaCakes118.html
-
Size
24KB
-
MD5
5dec60e920e320c50332e1733cbc7cd3
-
SHA1
92b0741f970880c5755e95f454917efe089b1397
-
SHA256
1724e34d60bdc68d13e9e6c579a4b5a9fe31d676134429a43cb636b317ac7495
-
SHA512
d9b7a890856221a52b33aa05f7220458e426a597fdd9b50c54fdda7a4dbb828bc3a191b7a67193d9ccff048f8612b23f50b3c2fdc7c2dd3388f78c3b37fb65c9
-
SSDEEP
768:vmDlb+x81JueBRDhn0HGwlzSZxsfLXuuv:eDly4yS2
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000004538d38a2cf7bf49b89e04e9cc6b18c2d698e8781941663d4eed530332459d16000000000e8000000002000020000000a412bfcbea11e326590325073449bad4d10b903c8c11985c7f7d9e4baf1ce9a6200000009c7b746577e290fa7e706cc6615653a503f11e326b49ae8c3ecb414b480578a74000000091639773a4d5c1707eb9e523554de1b3179aeb39fdc3090e87a0a4c082e4236d441e6ab5176d77569e778f82629eccc2b5e51209bbb9cfe5c9daea7bb7dd512d iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427589681" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{88B57521-461D-11EF-8E00-526249468C57} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8066c05e2adada01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 328 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 328 iexplore.exe 328 iexplore.exe 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE 2424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30 PID 328 wrote to memory of 2424 328 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5dec60e920e320c50332e1733cbc7cd3_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:328 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD589963ad6ea620acfcb68eb5dd8590e6a
SHA132156f42d95dc04887ac2d015c71f69e85ab9e98
SHA25654a59344d831778ee1fcde494d70101d88a49183c447c8deac30ecb75f6397a0
SHA5122617e7b858e366aecf5536582d0311a015832ebef0aac2bf56c6dec5ca01d25ef63bab0efba8f55effb64f8e17ce30b683f0b4817ae8a3279407719ca69274c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51654966bbc01d4675022f8bbdbd5de5a
SHA136d2b1b10af58b6d6b56b5b2c140c11131447dbe
SHA256a25a27bcba66e333dc863bd9071b1c314ebe034be61a5c67c909a1a30a3a305b
SHA512aed5639222c5e2d0d81ddc6f2d67e554bbfceee5b87ba2632e934287176f5773ca92b6de39fd38ca754355ea51c67dc99a3de592fd69c995e813d0b1f7c8a3da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51558a0d16d3255caa986bc8b877add86
SHA1382393124f16b69090c6c31b84bf67c14426d908
SHA256e43041176bfbb1a9bae2cc0b6d894bd1db5f39f97361787f1c26f76d0d1361d3
SHA5125f35d4165eefec807f552b84c9daf99afb6463dcc383b3357d81f595bb302e82d4286af4a27eccade8ec8d3f1d7bfdfd90918392c3e66b4814134c7a07d482d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db4d664ca18c6b76641c981a58a970f8
SHA1415bb8afbf6be71ad594d47efbe1c6ef787bae3d
SHA256c7c6ad8b5ad6f3ef3c485a98f3962fec1feb1d1506019356a092e6be47ec0f3f
SHA512de48d2b0a1a2b4c4d3a4980a7b42df7322cc6bd75ba82ef19b51be7ca2d9eba1840c7152dd0471427d08d4dcb1983c4307a7b658992503bc3edecaf24a78dfa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a5986e14d61f1c62a85eee2d96cbd471
SHA136689f5b2b2fc8a9e5074c7275973223d481c459
SHA2568d3c36adbc86ef116cae2d0617399fa56518ddb9334906e4125a799f28788fd8
SHA51296375a8010af0aaab16cdbc461b14fa8f5b6a0dc8a4e2c8d3101782014eb557aa94ec1ec62d3191bf58417a2d117f1fbd72f4a86d0f9ac4cd6ac6bda0f5a0567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51207ef35192d6cbb4e681680da822e62
SHA13faa7fc515a18b496378f996ec8cb765a9266cbc
SHA256e7fe9911957c777f3bf9dd0577040f37ba21f6416729f093fa6df3444cd402e6
SHA51250189557131d03143088c099990bbd447d97d76e105a1682622807c35f2109030103c63ac520072a6bb35a9c0b1abd6a450af5bc965982ac032e3449295d6ccb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5a269bc018e63174513db0cbb44208129
SHA1488f12ca3ff8692f0aa23e3d07c1af0256ce0b2b
SHA256e66c5067eb616df0ccb1ac10e20623461dd8fda0b87a9b5ffac4dd064b028aa5
SHA5125c7b8e47c47070a18d216665026652498b9e23796c896ede88047204e2457b0be01010608fa387f6f11fe28ec36d0c053bf27138373dd91744fe92f76b27067a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b9ff5bd8aa884eee13b2efe4cfbee1a7
SHA1aabd303c9ab4034885da3b8858a653b530cbe357
SHA25604abd215589d5ebe17c19d778b67c0920ce6e5c291a4de258fe21a816e5bff20
SHA51234695639287da5a0a652d630192748dad76f30f611b2366d93431643f3b73b78dadb2df62404b941069a0c4e908df4c340d9ab4d438c3149d9301dd1ed583955
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5249e0b424e019d63955e814bba306341
SHA1e94ad4dab67acf62a862a3549fca02c5e4e45150
SHA256bbca7b44a9aa8c3c7bf2f9ec780c863bb1a09583accb9b842d1871466c58abda
SHA5126fcec4d5edf82efb6f6c905125bc1ec27c25aec09d8e8c7462104c8bb4073b7187940203f520f6c90e439e2891a424469dab2f002212f87056533f7d9545e586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e950e53f695fc6391102a8f33636c3e1
SHA12867066ec3b5454a996131191611452a8e784414
SHA256c76c83b8d28a2efd84e810aa4a780e75930a9f1c09a5c2eea595fffb9cb96034
SHA5125bef836c91af7e39611a2b1a41db10c56dd8af7e49b37f37762158f9d8764c0a84c17f7825f14793f774398cb626bacb6ca896a67c28ca12d6adce14c318755b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fec5efb4bf5f438232e13ce6e729c41b
SHA15600baedd6109c5f6d86a711a19fcd3eab43dffb
SHA2563838b472b4b994f155973f7f89dc54b32fc75a7612251b66f3155175d054e6fb
SHA5129514621afb256473c6b3e85004653770377a811adb943400b0cdea05f6e976ed61d2da272db0e8f50b201e39eef889392e48396db118b5011140bc0930f198fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5dbbcf262c3fc28438b78237d2c8c5027
SHA1dbf06e39b0c9a327d3bbef3f4b0590d181f47edb
SHA25664176a273e97258f6910242049ec7b8c4cd950ec3f2bf8d2a0dca4565c342540
SHA512a4ffebe9fea9651d6e9aa0945241886f75b88ec5c5ef4e4a86d891f17fdb84d799d5fa57cff332175e141f483326076e0ae6cceaef616bec54e1740e5dd9418a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51217b8b65430c90ccaa42dffc8f2f987
SHA1866147fe89a4f41daae582e7261e857300a51310
SHA25606bcbbeb1ee9f99fdc1c64ea0bec88119a0da575377f74224cbf10e6baad8c64
SHA51204de86595a4c182ee34c211f3be5b231240fdb58e5789d9d9c972d4013e0fa7d8f4e2c83e4a2482272669d8e6982da2f856b607221d4409214d2ec85aaf87b9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ec7db4cbdbd5437b0b78d2e6b423762
SHA19c310addee6c939bb8ea6f1be139208137d38c49
SHA256571989c3f1c91707aa08a6e658bfc097bcb7e983fa1dc240e2e8ece46c6d220c
SHA51275b1baa8e576a88bf1fe71083deb0c1f784087bdfffc6b36f2dcd62c89e3e077e512332f832e744afd37f54c74cbcea43d801f47990478d08b9ca2ad6b09d094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57bae79893be78224a384875526901c7c
SHA1d063e4ee500a5f921a15443b9a297cf2dc5ab5a5
SHA256202a80b0da223a28cf14b2839a2da5e573b7aff0beea8db380636ac717f943c3
SHA5127ebce994fe4d4a7895c9364cc26aaa168539c9ef208955bed6b2e3b702342462bac74df59c9787974afa81a3684956d928ec003239bd7465ceafd0008bb10706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ea5d00008a84f34705776f080f730dab
SHA155b1edebb5b5f038cc35714826656513dfac1d58
SHA256906bf43ed13039835961fe813626e8118f361158b18842d6a989f18a5d3f8f53
SHA5124517f3b7bae2f38bf1bc05574cd19d31debbe5eabb4c62e7a28708d6f570f539978159d653b8b01f558813ed61167cd14a587c7e837bb49769bae7b715816094
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD50a2f154c127c82e683fb781073d921b4
SHA1d5a542fc747362021b1f882860563935e2dcf627
SHA256305920874e83c79f86db50f6cab17b730eb6b7fe55f1a670e0358ca2c13a4573
SHA512b338f6ca47144cd64baf6bc80de64e70a6d6ba738eb679dbe3b0a1cb70139a63239351d0b3b4bba469242ef56366369bad234dc503a4442893463b00e51ea496
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5546b680078a313282df0cc905b8a9e61
SHA1da90cb6848977e9a37a2751e8c7ba49c9155aab4
SHA256e1688e826d538a41c55646cca775eb75716c69be78dbccbd72a3074966dbdaa9
SHA512e7b633ace4da6587243dfee84698adbf196cf7fa7d3f85a8b4f7081492d04f3ba2f6480b676154c4a257be4eccda7bfaecf9a3ee0ca1b2343fe29f514d478761
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5abb165b70fead9b261d1fde3e4eed6e4
SHA1f5a4ea75a66d4af75dead45a106c561a4de0cadf
SHA2562a15573889a600b1af310d0429707ad3a05be1fd708302730b33081da5bc6bb0
SHA5126475d674570870c63d2c7c3bf1a5c29db180271612facddee48a823f28efc720b7ceb2cf49e504de759709e86367587240a748a7370d07f9565064bbb5b90031
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b