Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
5a209fd25bf2d5a1b392ad864400a4d4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a209fd25bf2d5a1b392ad864400a4d4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5a209fd25bf2d5a1b392ad864400a4d4_JaffaCakes118.html
-
Size
99KB
-
MD5
5a209fd25bf2d5a1b392ad864400a4d4
-
SHA1
6862152f4e5d194d65bfc574901fb03c41925892
-
SHA256
3ea57e0feccc3d25c4975d5f1ddcf6d05bfdee144c78fae2d8299e0ecae01e5f
-
SHA512
4a5ade81c6b75af20a99d009f00f2b2e059c837d58d26f7db61768200d19086d43b49edd84cf09af06664ecfb9bf7e34f988f701344b52e352bb3054678ae60e
-
SSDEEP
3072:jTmyH4y6hLIx2crUg1GzeSFLoIN1KMPy92okCttkNxk:+IcLIxyHKMPyQO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427518622" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{16323561-4578-11EF-9584-DA9ECB958399} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e337bacba951544a9a832c52e69bfb00000000000200000000001066000000010000200000009e9f3202219d8be0b2b9b2621c3082eef543ac93b151eb164f5e009e1a4f75c9000000000e8000000002000020000000d07c64c420d3bb039970dc3e9a3802dfdbaa21454f00c0402cb6141212c48949200000008f7c5aebd53227201a8a78e86d7db333028c50078c1216a69478468b996f74bc4000000053c5f228e33c98872dddbfc71176e1b7cecd00b80ea7ebb4d41690a6e3b3d9ec7da3559fb0113836ae38bfe604a9a4486823315c2fa07d642613234a8b86c880 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8013c4ea84d9da01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2480 iexplore.exe 2480 iexplore.exe 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE 2720 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2720 2480 iexplore.exe 30 PID 2480 wrote to memory of 2720 2480 iexplore.exe 30 PID 2480 wrote to memory of 2720 2480 iexplore.exe 30 PID 2480 wrote to memory of 2720 2480 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5a209fd25bf2d5a1b392ad864400a4d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2480 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55fe3359d39c9028e8194d307a3156551
SHA10504bd8079e8c75a29e49ccf2cceafb63b323761
SHA256aec7eff3a28a81da44b910dd7028a1b704675bf640d98c64bd3e7be3747d834c
SHA51253138a392f3c5ef99ed2a0d9957be6585fc27e6967aef91aa97774e0b36e513988b6f858dcc7e143ebf88c840810b2951d9302f06235b3935ae865245d486065
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5473cde41d2e78adcc82725d4f890443a
SHA1a6f1b0cce706ff587d636a522cf2e349e1eab6c4
SHA256bdd73f072477e74d0c09409ef72b0212c9a1458594655c0f4f404ce093bdda43
SHA512ce8f0befc737d03b49408b40803fdfff7def76d77406b1aeaff3aeed3c272e22eb63f217071b58e719b8cba0b6e3366494b09807ba4221d78116cd2e141d057a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594831446eea08b790aa291b51af7d18e
SHA169948ec68aa35f1223f2ece86ba662f1fcedd287
SHA2564f99444ad5b74c62dbdf5b489d25efbf9a16f40dd59470cd0a08dfddd8c27d56
SHA5120f164cee152c2379c16f17d0e532713753401d7c95cb3d12d85d586e55a0c293c13b3e0d16f434187f9149f7110e721b9123f738ea49cfaf69fc851ba1df873c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD527f403378d88b785a9adc79e94053b3e
SHA12d9f7de97a1db41de900a015ec6685bab89dc8dc
SHA256da76c4202f28b7f2657970d33842865d433f43d791d794260633121ba5891feb
SHA512f5c3c4ed16e1a3038b6b2fab4772e514d236cb058ae1044dbd52d2ad55ce3f3bc555d8b2753c76b771ae01a696b4397c69ff1fdcb041243a1dffce21831bd132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6164980f14c94134b8511142fd7b6cc
SHA1f12c85345519b0cb88925ade67a231060b32c054
SHA256dc659f51576576f8140e6ceffc88dbc4aa203502b6ece69e909a5cd5b5067543
SHA512ad238bb0c1f36a170c2624d8e77aa639b17595604fbec1c7356b9c5b9692dc8bd61207698e029f2a3d5fac5e7ef9d5f3b7d18b734b07c2e12a8314f85de92555
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a132896c2094bba43cdf8590d341a815
SHA15487995dc936ac38975fe1d8ee108b5857877a52
SHA2567974a3eef9fa48d3e739b363108a543852080ee4e38152a65c3ec0cb4793d4d2
SHA5124a258380503d077979188dfc1d4e68d1cec4d584ae1ff5a384480a827329a4b41cd4ee85a0bf81f3f154266145a3e4ab83fd3d245a4734f17a984651da2718da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f56e1e0f3dd32f5bf90196c9da9dde4
SHA1db1074bea423b2dfa188c371c32dce8c6c5181f1
SHA2563f5f5d707a05ee8edf3b95cf7df67cf8ac027aa93791f0ac06bb1b0967b6b374
SHA5122df6a160896ad784f6e4614c02eb141d50297367603bce846a816a8c773cbc180f78a18f7f9ed74a068ee4c97da36067134ccddf4ad83f314b5b1a0115701ba7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e836e4f180daa518d5d0d5369dc78c11
SHA1e658eae1d682d8548d317ea326ab86e7ad17bcb5
SHA2564b4496089bf87e94730ab099ed0af81664d79e563d3b147f20b0a038259c6987
SHA512917583662c8fa4735500bb8f3b4362bb36638f1836aa19c84252b3138bf3a4714b8af4e702056fe906499f4d80e195dab71926bd05cc423346542d2be2db36be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56df71c3884c61cebb4ef298b270ec5b5
SHA1b087f53956ff4fe9a270941998dd1a3e1c4a4d47
SHA256acc433cf76df6a592fbe3e156937ab5c57f907e3bac8d0ec3cd954a6ead3ea63
SHA512dedd47ed84c8ed08d52da5089b80c357171f1cd5e43a8c33dfaf8cd3b38a52ed70524be9b81928bd23c2e27f826aaf776d9f3643203c7fe9b46ea839c781316d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b18e235dfe939f2a047ddde0cd04fae
SHA12f5872902f9d22944dc6a1acce1877594428ffc9
SHA25655ed8f8fcfba8f4ee5fddddb58435a8eec5141059c202c9c17ce3149d6bfc4a1
SHA512a25ee92dfa56a212e13a7b5775750fd19c85e40921e6ea15d2771175b3c77e2b11f9212616152386408a96601648030eee0ae92a7e28b5d3fbe5dae787752675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5076b681c37144b376accbcbf332ff686
SHA1b26b2955a0d5b9cb4070e3a9cff3cde2fad027f2
SHA256c75819826418c852956578913958fe33030c35a47ac2581ab24c20dd103c534c
SHA5123d7347a3ab9f82570cdf2329f069c0e71eeeae35fdb013fe2770c6f32c1cb70d43c51301c6604ce960817861d010e7a87c4f1db91d9ce834200a82cc48bc2724
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d1e29ec4696ddb980d9b6a5fc77677e
SHA17445c7bcc38e61fb1200314fc5ee1dcb0bb7158e
SHA256945246b38a4640e60f7e6dc367d5fc2920e05abc8db3eef4911d2abc1b06e254
SHA512a3b2e96e3ff4f4101deeee284ca38dee5ffb5a4cc94356df391b906a78fee1ad85fc96ee2cd535981e52746f6911c6ac4eede7bb9bae058f673d939e0447fa4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9f7a6f563f4b1e2e88220f384111224
SHA11d02c07ede43f9974c585196843d9251528b99cc
SHA256dfff295dca4ca9e622192703c0f9230ef5e05c39b689e50a9c0b2c4914b02d51
SHA5123a11217f33e67079c50ccaab9c510b9cfb9267c1d7b7744b6f887069369fb5c19298e665f63cd6b42a348fde24d5ae9acffdccef9069b3aaaf0a7303dc47716c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53325607238604b1afdbcd0bd5c70b81e
SHA145456bc8486fcb6462ac01baa45e8c9eec8c56b3
SHA256dc13bf03c87bbdb3f6e85316c7da933432d11fdbe18ebd1dc66758348b6bdb2c
SHA5126f24435495e6e85dee58f3d7ec7dbc40d224aff3bdd947c3eb53a0753d5a251acb00d1428f874fa3fe6bb12eeeb1d7b33b37f963e5c9ed83833a91ea4d38a2f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bae1b5970726db779e1f1f542d95fb2b
SHA155316fce3893a514161f23e3ff5f18cd6fc623a3
SHA256babeb3074f4e51d7f06c2934fffd3123b476dd719f5c71343edddb459599db90
SHA512d8ec95fb6bb86cac6330a4b0821fd686d1ecc0c51fc81fd3c76e5441f935ac5a408d8a1e5d6323837a26f28c56b61cbbabd7df7eef77767e4592019f137ee84d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51c02e2338e9aef9feb9de92f755909ac
SHA10f750ba1fb7b6ed205cd9ccd61d9daaba6c1c32a
SHA2562fe60eb544ee07a921ae7bf4a326f545fd5b0af4215007d0801f67508ab62398
SHA512d5ca4f5b01b44ee5edc4bda6c4e356e0a59e046417bc12b12a49e5c6556e0d4355bd53e8144e8cf73309ef00e021074cd3a78148bc583dfef7222e68dabf4ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f63e22535e51f2627e3e0a410931ccba
SHA176fc34862ddb95b48303f35347e88e58a6a707f0
SHA256455ed1501dee0fb1053c295cf9c3e5727953fd2513cd8760aa96ca02fee89c00
SHA51218ce4e9b0da2128a5350ffabb64ba240e1b95c23706edf9cfd0f13c58f5e0df11a9bf44b3de5d64a6b7d98a8fa8435857f4709dc3b81a79d49ad745b5e5a9b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb047e6db893be1cb0016c7f059b3f5e
SHA122ef2933cb1941fbeb3a1f10108c9ed5f90637cc
SHA256896089623e204f835d7e42fc16c364f1433e031b77cc3437d6639e8e7f1178c5
SHA51298588e839ce831d935308067388c05d0af30843f6413d02c1cab3ccd7a8cc116b36bb467f92322b4bda00ba40426240256ed3cce1d1006e377d642d3eaa323d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52acd2825a791693e9e87259b4e3d8592
SHA1dea7ab9b5963da54580d5b3173623c5840caeccf
SHA25658e00626d1935790b016c31fbe319318c0bf1692731ebcf50fc17bdcbf3ae523
SHA51293587ae423eb2b572615f6025ca2cc9b963dcb45caf196ea4ff4865f0d9487dc1796ca257453044118bbd5fc5d28d27dc62bdb91ec22ad28f9d5cf02f0eaf162
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b