Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
5af23327a2bf1253b200cf79b3880a21_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5af23327a2bf1253b200cf79b3880a21_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5af23327a2bf1253b200cf79b3880a21_JaffaCakes118.html
-
Size
45KB
-
MD5
5af23327a2bf1253b200cf79b3880a21
-
SHA1
ea813bfca3d7954130ffaca2062510d4abebc16e
-
SHA256
f180a3b016e0a14e27a18427cdb3d5605ec3bbeb0ac2fafdc8c41e8ef7d20228
-
SHA512
a52c99a894d503b4b7a1d7b4f61da0babb4a034407af9adc2c42b522382ab27f5370c3308879f6690136a7c7b5daa7f65801562de9fd29c3a7a418b8c2fc9935
-
SSDEEP
384:C4+kP9E3yQdMnpVh88hSh5shthwhPhjehRthIhNCthRhfhBWhJhKh7IomHhuh3z9:C4hP9ECQdMnulAfVLZW2
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CAE82701-459E-11EF-987A-EE88FE214989} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d088ff9fabd9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427535245" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000004af478dd67512af4308b0bec9eac0cd0d5132c386baab13acd9141427a356ec2000000000e80000000020000200000005958af227e30d9c29e4ff70c01c91ff9768f9e2b3d3e1528667cc945650edf13200000009eeed13ca41317fdc558630e82076a1e0170cacee012bf4af1f2f81f927a2a5a400000007e08ad7bc775bb07a0c3f52ec7fa4d4f7ed90e44749f1b9604c49a7a467f2c29730ef3b219fa063048e10beb6543be48e2910063c54f5a449a8118b22445e8b4 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2944 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2652 iexplore.exe 2652 iexplore.exe 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE 2944 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2944 2652 iexplore.exe 30 PID 2652 wrote to memory of 2944 2652 iexplore.exe 30 PID 2652 wrote to memory of 2944 2652 iexplore.exe 30 PID 2652 wrote to memory of 2944 2652 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5af23327a2bf1253b200cf79b3880a21_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2652 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5270fda2ae0a8c385dbb3dd7315d48b0b
SHA1a0320a9684bbd89c012fc38fb2c03d8d09f8d837
SHA256776632f29f49d1eae6e3f42344330c058689897c608c84dbf2a6117c63f9b912
SHA51283d7ed319c89256cc73bc5674dccfc9a630ae6b74ed204317b9698b1f1d388d7a3b9ab9fcebfd2653081cc0c26bc4f80abe14b4b504593415825c47ea1f37e65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf31c4ce18bcee69eb93de670dea06cf
SHA1e3310a35b12c274534d445c3eecd3dfcc49b379e
SHA25648f1237c612fb7f5bab7ba09d1680da01152cd83057c090b2d9d369313426112
SHA512262e972f28642647e0c416c39bdb1feb92082db49b5470812e930976ecd511af037620b48ba1ee607388507fd25f1891c69c9516eeccbd580e39531376f7c256
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb33d433796b8f5b7ad6631e94591986
SHA1d066f8bbf24aac55d592a2865d645352206e1002
SHA25646538b444fee819db5727bef6ecee1546e1b891eebaf07468b02722b9badef67
SHA512c5553f5ba7eb9256163a9c0bb87aa8ffaa686153cd86a0c56fc8bfc1fe44789e419db99c49baf2070f3a3274148dfc3c1907bb7bafed5a2f7f0a9ac8f2235e0d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af415fdcf90289a8fac8ce2ac52cec4a
SHA112bfcc712375890030c7dcc14231d4005f886931
SHA256c15dd1a67b2df4f9ac1e939fb1ed0af9811db72e3663e5ce6c5b484b547bc277
SHA5126e2264bdb6255cdf252e694a137e5e01f181c18a04cd8c229b331f5cd6fdf4cc91c15fc7e2a897334f1b70e7699c94312aa024e08b5fec3981c048cd5bb354d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd8ca03f9ffdf7f7c6cd987679b187fd
SHA1627a63cb76bf2d2e9f240edd8281edc3230780db
SHA256a2254ad246d6135cc4c89c67ee70fd474dca5459220b76f02a2cd38d9c5ec384
SHA512bc8df3ce83ee0dccfbef2cc2553beda7e6b61f231268de1a2d855b0a898d27499d29546f897520da8f21e067252aecf16754ec624f0417f8a6d95e7884a4cf64
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a571fbd1bf5f33db8e7000b4139fab79
SHA13a05a54fd7a5fc308abbd6bdb657898007dc983b
SHA25662598045396fb792055f0f4dd45c637099850a358f56af6d94daa2b16cffc1a9
SHA512e19189844c91458aa9cfad21a817c5b4c2b6972d5758c459b1090b0a530d98cd171a9ff23252a1e39479ef10b011572f3af98fa0a5a33d9fa584c812d8b0ee47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD544ba71a81ff3d3e4a5b2f33330336506
SHA13619af3aac977d93d950182bf09769bc1f2975dc
SHA256799efcbb9f761eecce7faabdd6f2adc5c47fd5969bd89ac7cde7b02bc2f22612
SHA512ae49528e5a24ce120717b154a06e913d3cf084eb2be1fd6a73429902d2bc4f311b08b9bcfbcba2ae27bceecdfb0117ec82f8018e3b9e9a43347709b21a37f9ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51bf88e28d7813077e58f31fb0ebd9e32
SHA17c55a81021f618b6e2da7a1be4641aa71fc53b74
SHA256d4c247543bc0e74c94c21cb8f2b1d5408d8a060fb52ef8eec499e7b43283c881
SHA512f71e45dd462172447e5ad8dba4cb301b2ab233a1406f586ce26d2e3d90ce0cb60980f0ead9844eb1af6209843ed0275753eb5adb8384da4b2e28c525a6e4b9df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552958053635d1256adfe84659c573b1f
SHA107afe76bcc45481e771e2c31de02ea2d4096b45f
SHA25660427994e8b3a8092360a17d9ed1f21fe7d1e12fd8e6fdcc06245e375049e64c
SHA512e67c7f5dff933f2fb25bc4214555a8511f191d951e081f4a3090ec71d99785eb1d3daf2e63743546b2e3d1f17890169174cf813a8be03677e406ba8b4a1d17f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d02dafc9efca2dfac7e38a3c9ba2f2a
SHA11950400314770a274f180d371c356738265639e8
SHA256caded09200c0f565e1a41ae867b9d66457b2d190cddd844baaa6a0a14b04eb97
SHA51294f992fb590f48774160445c49d8332f96d74cc93e2bdcadae099c3925dd028423bc5be44f86c008c63b12709dc0b0f4c920c06ede5825fb041628e977789f80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD563cda964a0f1e6ba3adcbb304c290171
SHA1a6605301ac0149da827d02d40e6f2ec8db142032
SHA2560479c02f22905bcdcb8537905d46a3f6ee0d73d68fc34aca4df3b3b337c2acba
SHA5125fb52a88f326a1c5619f15d5176e93d473cd53ab3e990b93d624472ff48aadba34d0282b5d5085affd576a3ed2e1781a872e37d0efb47536fb04a084b80a8a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aacf76ceb42dad74c549d5f849a7b00c
SHA18ccc201fbaf842fe4f05870313e5e1d5957ae563
SHA2567b6bd1781ad7c114841dd348788831dd475b64e0da7b23d8a567e33cc13a09e3
SHA51275ad63f654fa3a781160200acce3753d2913a17423adf6672c48ed9d3068c12655ca987154cecf77994644712ff655e6c7bf5e70b60bbf7dd0ed84c8ff4f2931
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574fb8622a98ecb6851c71bbd70e18d24
SHA1ddd70f2b994b7945851781edfa33e34e100aee95
SHA2561cf22123b379a89b6a194830ff6bd1aef4fe19baed8924fff361924657890886
SHA5128ca70e15d52497bb61c56600a94e56fab3e72692a88b6f7018642e31ba84a1a91ab0f56cb226f9729cebebaaa8770ed07da2f859f5f759deb426ab9ccb3686d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5333a4470e9d013d42991bc9d95c7aede
SHA18c132dc74bea53ab40dd852a1ffc1fc4f0967c4d
SHA2568e1ee20722cac0367d09bc0ed50ecdd03117a15db859b61091c9bcda7c3941a3
SHA5124395f8d7a39be2ec1f75aeecbee5b6ec09bf494d93401aa17226587fae9b2567b3b0e69398589870069cb33b0228dfd40e415b8a09c81c878252f7b4518eecea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5a9993263e58e8cca44a3a32704d1c7
SHA1ac63d91fce2f63446de19ddaf6553704c96df598
SHA25675f8d663b19569b62485b116254fe6eb99ed3f77e6d4e8e0a105ec2ebb4ec754
SHA5129c4bd7d1eceb801cb5a5012d57cb53212227960e29c050e678ad6c107e526ff16fa8ff6658d20f2cc4caa93bf0a9be4f57191fa5a54086a7b7810893db43ef51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5414c0a95fdebdc47267d60b6efcc1193
SHA18ce88265fcc040889c0e8b0d09a1cd5f0014a1cf
SHA2568526900df80feb1d3e3c0e4144ec9fc7ed946cb2d0d938ef69939af5cc50cc10
SHA51295bf18c6535f55a6be955aba6abe7148188cf49a8ed6006ff2c3a058c0a62630cf78ebf73eac9e05957576e3a6a3f28a6a9e1c75576286a18344c396b4f1f0d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cb0cf88023e618f8383c8882ca23cec
SHA1b78630b2d153841fc1c475bae526a47a97083892
SHA256ea483b5e10be32a187b053a3799609bfa4db2002a1059b3d002dc6b4ccc55a77
SHA51283d6eff9f2cde9544ba8fc370bd2e120e0cafd835d2c50019d3dfce3ef917c084c946fc25e199182e5a8c2a1ffbfb0813a46cb45cd0e3ae3ec0ea58d6583455f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a1980fafaf611e446e6ed5ef9665e86
SHA1932c1f05b86e12b784d232360b5bee42e11f8f2d
SHA2560175343c10a0817671db25912287115b3e6d39f0853d3c15fe85201411f68962
SHA5126d330665e7e43a524212f113964cc17ab9804f4a3b4e85af8aad5c3f28c594caafe0532789de02ba64173501f43a6a79b1d096b418226f1be4691d7ab339c232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595e80ef2e947eaec51ee8e3785856f08
SHA1aae37818e58779be28812b76f8e1e40f2e99a8c0
SHA25655f676636b198a24509ab6c4e2ac5f9aabcab51a3b73d22806a9b157ef75c0a4
SHA5122445b80b8950f0cdd412d9f8deb9834a82e16aad48a9ae2db95f15ec89b74dcf28cd6feff8eec58aa74b7afb132e0e6982e0bda135d01c48c9cb233ab08b1210
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b