Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
5ac08c4834c45788fe3e51c496f5fa23_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5ac08c4834c45788fe3e51c496f5fa23_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5ac08c4834c45788fe3e51c496f5fa23_JaffaCakes118.html
-
Size
8KB
-
MD5
5ac08c4834c45788fe3e51c496f5fa23
-
SHA1
cb325367a28b843c9ad0e8c10f3e14a0ec707f7f
-
SHA256
1bcb59f2b459247829747f0a702465af8113663703a2e3cc7afb10305ee87312
-
SHA512
67006e752515a967efc95d45f1b2e5274a859c44b6d60b931e80037da390da3470939ae7800d149977116c116c9c3a010181c9f7548dceadf484a99540a2936a
-
SSDEEP
192:OJqoIU3UXIPGiAowTITEMrFUJbfvQL2BaEku4bqyOvblAvAq6XA:OJqoIUEXIPGiAhT1JQL2gdu4bqLbleAO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000043174f1aa2314a47aa677ebd5ad1f6c700000000020000000000106600000001000020000000e30b61da638053cc7e3d7ba0bc46b9f34134a9d0867df5e424215894bc57b7a1000000000e80000000020000200000003a2e96e42f83829fc631f4f3b2661941498fd9038eca58a953356843f9bf9b2920000000ae8e448097a460c8f1727fe3f3703e3b5f6d53e5fa28fbf482d53512eb35f331400000004d208aba708cecc8fcf444d46ce9e439343718607396a9c5d6d41ccb628f30a9114f9fbd8521b8664cc56dea5f7c9b5eb3fc1de83f216ceec0d6195d7f953b82 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{565E7001-4595-11EF-845E-D61F2295B977} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427531184" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b073d12aa2d9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2796 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2796 iexplore.exe 2796 iexplore.exe 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE 2848 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2848 2796 iexplore.exe 31 PID 2796 wrote to memory of 2848 2796 iexplore.exe 31 PID 2796 wrote to memory of 2848 2796 iexplore.exe 31 PID 2796 wrote to memory of 2848 2796 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5ac08c4834c45788fe3e51c496f5fa23_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2796 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57153179d89f684bf151d05b8ac6e7a3a
SHA127581b8e28cf3e27219418ff0c4e33c7c5e90955
SHA2565aba2bffaf29c25758fe272a2640be82fb7732a9d67c4b3f6e07fabae379f111
SHA512c4b7f336035bea464f8124917499ebb448401364c89a10b44741eb9874684e9cdce68f2423b57474f1db44d61abec46436f57713fce7c1608be52908b0355b1d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa0f9918e27b24838b422786c78caa38
SHA1d70225dd0d2bfb455be026905d80be68d3d39de4
SHA25631a68c72aa4db8b14f06ac973137e0501e41e2a40f6a08a7946fc4622897c836
SHA512fd246158e2e98e4d021c650e382445b102ae9f73b8c3ed8533c51c32bcdf84ae782c754abd0b173d66be455596f65e3f6e6c05ac8bc789d5329772c199872d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ceb26fbeb3b36922a6204459d9042742
SHA15c180aa9bba48e987801b87525c7dcfd92fa3209
SHA25628d7fb0ac5d2915659c644fe77fe687fa627edb67f576ad268cee8c5c068fc2e
SHA512ff6375f1e45a4efe8362823fb9f9f5ab60123264adeabf4cd22475395d60568394603f827f85fe30dae708f0b8ea49979215aff6382229d38fdb9a2e61ddfe3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590af0edef21b5c0336e210fa09ef9070
SHA1114360008efd846f1dbd92f0e94cf06e64567139
SHA25692336716da7b8ee0cc2324307a7875f8b4164fc938bc36711f7b212f4da1170f
SHA5121a0dc716919e11af4c675bdeca7aea9aeb32b865874abec237c6c8c37446a2908447151937209b3e0bfbe7d1a1b85f6032b5854a96079d7050760f01ca237c8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59bdfdc812f982230d90aeadfae15fbd4
SHA11c661017713aece642c33b02667059ef7ec8281b
SHA25605442a789b5f455d41b9ca88c98f5afde25ec9a74d10904e4d80b5f8704213f5
SHA512f8e6b3b282d688b70a50f31e6569484a78e7171677eb50eddb2c622d3fb2211fdff6bcef67ba41bf43043ac87e11a50c168a696ecb203aeb73b67d3eb5d710c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e5d6972bbc7447b8016a80a0d6c02b8b
SHA1e1aff919b165d118d8a38c769fd1237df3dfec10
SHA256d6b6ecaae27242ee835f5f1082731fe483159e7ee6d11c40ea2f6552dee36568
SHA512faea9ee72b1b1487b70a51aa3048dbc972e5fdafb8b465b8d42efc05a698b0c8f8f2bf0151276cacc01ada64fe90f44f6ff6a655b60182a6eb47e4a7a12fd166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e90bd6702f5d1abd12d0ed45eb21aef
SHA1643d2259df9e5c570003c0895524a553202fa2b3
SHA256e2228d27c9f16ad8468a91526baed0a55a55818a4ac6c0b7e44ce27022086532
SHA51255ac21e6797c9fb188b2a58397b7f2f57f4ced23b250ee431681433b9bc3ba1bbc7b4c8c70a88b5ede467855543d104adcb2333bb831bfbac6ebb200cf290e05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6b3f8d960147bb24a0fe5b7ea4d802f
SHA1dda267221cd456713958898a70f72fdec2899abf
SHA256f24182ab6261d6cb87aabe63a674a5d09f28ee2a6c4ff7e9c65d043ea5b9b7ac
SHA512308b8398287d8a21319ba7c44a1646c2e1d4c8d61c77744c2a7da8c5f410da6cd79972604ce93ad4fc022a120c5143f2287de24b192d6537dd36d73abef5dfff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53bd3a8f59c0c9455ed1a72b89bd4c1dd
SHA1fe991573a89dff665970cb313608650fe844f470
SHA25636d66b5ceef49a460561ee6079e53d463ba44c80f7d95efda598f5df7acd10c4
SHA51246182b159997f42c48e298d6b360db0b546488b6bcb7bdce5ef4973894bc6a207d73088464bbe2fa6980ce98423a95002e9990bb84b6b7fcd58f014d40ff50f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c16c2e22f0206a098481ffae0841425
SHA1a318945dbd62ae68dab42a10a3010145a4898089
SHA256ea5b9e899620e51b6052bce6fd739e5389122fa3daa95c1c98ca8dde1fa543a5
SHA51254505cae1f7a1923c8e8d10e15ec9dfddada2f41897a491b0409425bdeb3dba890e66e1f08091b8d3ce4795d39ca6684ee2ed255e706537b783190ad72ac2da3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5574e6044c679942b164cc284a230dfff
SHA15ec924d37f97c32a04efa59fbca0bc2971b159f1
SHA2569344c5b714fabeacf6d116d525f9cd6437a1c95680b94bdc10e5d82ac8428ddf
SHA512302dc9d411cc30b9ffcbe472c8bcda32625af853ca46c02917cab387ad62594c3629b7edec627aaef4a599a5074c062c3e7d67f8b601c5835d34a7f1d912d89a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f812772f4e22f22c6e332a224169d2db
SHA1c8d3980f89c8e2296619366c0043fa172c397713
SHA2562e0529c326b1b91062badda6ccfff29c4446185584d8551e0b8170ac6ad4cab9
SHA512048797140700c4ca305388d09450e65ceb4b7d03b4f35691ccb2419d14c0e7257378a5600c3d8b7ee6166bb4afce4edb44cb7aa67acd77bed555caaad6398f0e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de7920625c04e2e4400cd6b8acaef165
SHA197aa13d23dad08a0393c3608dbe37a0f7d874d7b
SHA25607bb616e03c7f4e4a72e5ad3f0047c042b2f5cac86f297dacf724a3e4dc302f8
SHA51243f15b5d5bd6ddb955ee7ba3688fb02a42110ffd22a6769c64e0f8e75ec2022e8b1fb4b7ab2ab5887de09b9235259ee6b17ae3dbb325ee0c58ccdc9567305d07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51f9a0bb531671dd3341da0f9e130358e
SHA171f5fc93c6494df4773ae2b367bbd6ce484c6f8a
SHA256078c682c295204257dd8ab99c6f6375651bd9efc197fcf4d576e8e1f9cf7b129
SHA51225979dd051934c187169a7e0ca76313227d96913d3918be59c1e219665281415835e838924f8ec2fa79d9eadc42bb6ebda491650119819dec42e3d1bf6c0b080
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55860261f63b11af3f5b05d62048fde63
SHA1f986eae0c75c6ec478a0c6804fa9c004bc3a4649
SHA256f76ef56371e671cc861b4bb13b0c839ff17390e62f4ace7b260b00258955af08
SHA51206070ee4141449df8b997d05054455ac81003c5b63fd440c1e533303a35a80d25da6e6c0f6adfca6046cb9041458007283a54f2db62fc0767c47636a836a4168
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f79b47935d0734e0c919686a5013e5c
SHA1ce86c2db91cb41989c2c93c950cff28db4f7c1de
SHA256e95faf4e607b85097ed339df1f9ecc24eaac47c234037c7125e5d786e3b4b8d2
SHA512e8930040d4aa861dd7fd01bc987188bf8bd473d8a6ba4ecf8ecf85ea20180bba0d135194bb7f2132e6b6023d148688557be549da84fcc3bca907d83bfd7c8cf1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad2cc1fef152c5157a1e1a4e65b90f27
SHA16b4ab631a045e7172e7269242be50ed03c86ca07
SHA2564872aa441e44457f169936a43584cbc06e3a314caa526c92557d0d9b0b08c3a5
SHA512ac8b14c6daac103cf409703079acfdeb23bb8eafb2d012b204b9094594a87f25d1b84967c0386e2a1d6000e5ae0ae4de33883fd8b0508f3c835eb0ea1e8bb179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55aeb3f31a3b9d780f2c924a7dcbcb57f
SHA1f01f38df12902b5abf78b49c9cf5323d21a27a20
SHA2565e3f29efd18a90c215f04ed0217d23078371b7f7de6930c5096703dab779a6dd
SHA512d4b0f66c55508dd4b1990f3ae502665e5d39f3b33a79416fa4c3d361693ba22889aeb332f9a363635cb4df83991d5bfd9e03b72421ed0eb4072851f0b025165d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585998de17b3c5808353bf57bcf063564
SHA10fe2aeeea36fe89bc258f1d353d165df4b32afaa
SHA2564e13fbd0d101fb909ef756e88d2828aa59a54b1b0e09edd2a01654d4261ef33d
SHA512d0ee5ce613ed6fd8c147babcb5f1421c33eb56d0a35f3b09bd9a018e53ba5e5cad47e666077bc24c526c96ead27769c4a2211acdf9946f43b5bb7730428c5337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cc7990bce482015842b98c38a1c02a2
SHA1a19f85934cf56e16d477bc6caede632653fa19da
SHA2565c4828b571da451bb67fcd1b57425422b6f4ad618e6d03c94c608ec26e46a146
SHA512d1afe7317aeaeba5a7579e70df5d83d98bcd45743304851e42deacec08d458c8f43f56ee3f9416101adaf95c9da09c522d8895a04caad380580eb54c7ce8d584
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b