Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
5ae0e7de9e1026cc730ca43c41c3a18f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5ae0e7de9e1026cc730ca43c41c3a18f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5ae0e7de9e1026cc730ca43c41c3a18f_JaffaCakes118.html
-
Size
103KB
-
MD5
5ae0e7de9e1026cc730ca43c41c3a18f
-
SHA1
9a1ab6f8edd2aef9004adc36a8708f5ee650bb1a
-
SHA256
ea1cb49f1347230b0ed59a93040035de915567e61fcd31f2f186d5055e6982a5
-
SHA512
bee1de7ce56d73702c9473bc104108f1d04753d9b3075d3ede01755a23f5b3137ff0dfbf9df8c1134d8a78ab2bb6f2ed5fd0a71c65ad9a0c3be8a56edd2a4389
-
SSDEEP
768:sBpPPLKoPlF/eDYPbx7HG4a/m9SxeH9Ww09LVMrAvl3vNNHOolaywHBIbW57TqLH:54kYEdL
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20c4df4ba8d9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000082ebb0b9d6f3f0458e93e15bd38f268f000000000200000000001066000000010000200000008c09f6d914263ebde1be8b4570053196f24e3f4ec65cb7a914c90bd2ac4db39e000000000e8000000002000020000000c73c3abf05f62f345b4ab98d4ec9b36f35cbca505a0bcf8782d283914884c651200000000ad4d311e5cf3060dc2172c0b31dd947430e59e8011de42ff0ed0cb27a6c0db540000000cc876ca9220390cb4917740e5437243f66c8cb90060aa2679e1f2d2171f35d6af1edc504e13880ea350323fc893f00ee67b6123b84edf50de5b87d448dcafef1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77275301-459B-11EF-B507-C2007F0630F3} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427533817" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2040 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2040 iexplore.exe 2040 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2340 2040 iexplore.exe 30 PID 2040 wrote to memory of 2340 2040 iexplore.exe 30 PID 2040 wrote to memory of 2340 2040 iexplore.exe 30 PID 2040 wrote to memory of 2340 2040 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5ae0e7de9e1026cc730ca43c41c3a18f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2040 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1c4f72dba80b13c92f502c978e91b90
SHA186742dd305728408204774137fe075cd27c224eb
SHA256a71a3bd175b0bf545632ce219f346c5a36284e022554142a5343061f18f3aa3d
SHA512d19da35f7acbcf00987969b3603af89159ef8b4693dc5cc49cb245338a8aeb05175218b9acc5acb1302d5f6cadded1d20b31f50302de98f6e6f035dfae065fda
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5efb2dc6a137e31005a7a837c3790c263
SHA17564e1a8f63e91507315440af01cd3b66cb22313
SHA2567ab517c616995dd3f5c22a33cc174afc3fb09d3be9aeb59852fc0599b1d2203e
SHA5125cab30ee78140392cdc7b6e81615a9504149a7ea52fe9a4d51d0ddc4efddac06fea955af4fc5d5a681b9cd859f83e413b2ba1e18131bacda29ee2a1699ad3490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cffd89bdd882e90a04b236b6453ed4a
SHA1b09318f10394611f6915ab879df3d487ee9b133f
SHA256bb05dea5ccb325a5e682834c16c0f3cf58e3ee5e5f5f550f388001da936860d4
SHA512c6f94a1616d0216de8753c2745fff3beee93dff41ac3fd7ce817370e70b73771a1920f9b5fdbca287bf2882fd9074b033fdbf86bab87484dab6603acc62fc83f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e17a3ca861fede58b8728f2257fee7d7
SHA143ce8cd3e117a35b62a711ced8419bfe68e45d73
SHA2562c3ef8e91595e4f96e5bf4f66172efbc37cbc383c79097c93468273f69bd3556
SHA512f70d87cbd3f267744dd4d6403c957785e1b37bc518544a527aab0e2291bf8450214c0125ad3bf3f743e308f20f3a0acb88556f90cab403319ee07f431d1840a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5368610a6162ccacdf12e7523e911580f
SHA1b2bc5afb05e8105f9d41f46bf3bef4a70905e5ac
SHA256765ed71f13b36994b5e3fe1f374daec68f44ac39c41436597da13538dc4b647d
SHA5124b4ea45d982bd6a1bcabae70393127b95856dd7c6fc312c1c99ea78f07aa27fa190947c4c6db0daaf889685944bf3dffa7a0f7254385968b06308c120c950216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b0c580968801bce28319d45b79a4e11
SHA17c22e6dabf05559958a938b97a24e9f3a29958fd
SHA256f7e5eeacfe407c3ba245b180171bf51154e6241be497b327025a622098a1166b
SHA51283ed60a374cb0bf5aaa7772b08c4fd27b20ef9cd6f865850157a9bb436ec80609e4b0dddd105cd6dffa1ca1f09db4480ded05a84a09be8b5bcdf1f5f996c0665
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0c91cad2059d8011c863a295d7ff992
SHA130c2d6794e36beba0ac090bcb616aed3c77e4e7c
SHA256ba5ee93d420e77ea2f8f51b988dd3b8b9a17f810b0e0ccfbe4a80fadb76b6f36
SHA51287387f8b2f6ca5fab1fe0659b5c373147615b8cf4b95a7adf9633fded2e9863dc73ec96d63d9661aca41a1424dfaa1566549c0970358c061dd408e1bdde15603
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6cb226e8d8a8174afd4b33e67efcfa8
SHA13d1cc82c649276f1e6d0ff787e7543ea8d5e0955
SHA256a53608140765158fcf0b07a9d80e08b35b2b0c1a47049a12df062d08aeffaf66
SHA512c3a15463fed2b4839a888ebd39bef57d5d987a1330f063c965121293c95bc9027b0b29342c3a510f0237238559912676d473606db0ae31100ee903f8696d5d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50338fb6c3ccaf750af125e671669497a
SHA18ef86adedaa2d6d1abc3a86afb7e70ddec589d82
SHA256e07e4256b21f446137fd4ee5938747d23621bd2be938bcc97dbdd3da8bdd72c4
SHA512ed9e20882d1eeb507334766fa3bbd1f4b99d88d30f53bcf33dfd72e2d0bf2443dffb43cec8cf6f08f38636acf783f818bd8f36f17b2aff09b59c1e4dededfe7d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572088d1b1e081c5232dc65c724e61ed8
SHA1d2dbf9833a05ebebd57f5daac55088748b723801
SHA2565441265f01a9d2001c63385019c5e36c2071e0f1bda6f6c00e83a71fb0296383
SHA5121d3677d3c328eecb9491bf68ebd235b874862fa7c19d79525a1cb468dbcd41ef06a6ad9046d7483b3882d3aa96fb9672336e392ef99e061ae796722a842662c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e259fb88b3e94f2aab83207b7bca7648
SHA1ae72ea046800ad200e274b147eaa64a9b1d8f318
SHA25684e0ffecb1f0a16314a913d0c9b8949007b23e5f90e3baadf6cbd4370bbf39f0
SHA5122a87d937a4115ba95aed8f384e35919b0fa9f25abb0ef572ac244f321aa5ac12069b46d3e203e68c214a7f98bb50a86ce0c5da53fd4ecfca80809e2666665edc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5265e0a40210cebf29a48b97334fd8172
SHA1ac3f040422ae2a1397b9b2062b966173a7f8537a
SHA256955d78539294e42130d61f4647ec6386e5773ab6f0c5a05dc301679c0b8e8162
SHA512807100a07d344a2399c3f9bfbfd38fa8c757b28321a4cffa280c0cb85d7e3d9ca0642535c8ab8000931973141fb90d3d096073d447ea44d59b70e91b0d9dea8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5864f3b4dca4fb5fd0de86a154a38b808
SHA174fec4848c799896e08140d39f4bac5ca1ba92db
SHA25648dfeb3e636894ce029e4799075f311597e0bbfcd10e828a05b377d3b74fbbb5
SHA5122905c31cab34cab40c76191bb91fbbf781757c15da434264c54e93be1e69dba8b84db53f54eb45252a04ad60f6ef77d5776cc38cd9df0a4dbcaebc74825b9304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa8b86b68fe07660a97382fa895908c7
SHA1d0a441eb65d607bb9405c0a316cf7c480bd7f9e1
SHA256e709af061640d6d31ffef935adec2851efa11cf8bf5089558b8f3495535546eb
SHA5129d25eef61c1053132aa942ace09bfe57e92d68a9c0b5e681fb42a6f167fb2f4faec21ac6b32755d89efbfd554c3227113712f120b73c3fa386faa180ed81a046
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589fb38e3b84bcceeb1ac66c4d92449dd
SHA13c69e2a701a5e8bbfb842b566cc9fa6c313ae56a
SHA256257ed44e07d3cd71e63329760855f8545bf5d51dfb9d0bf3c0e6a2e01739341e
SHA51266e8e04ff2644debc1fe8b5e6dc08c0a735803f05aa54a779217f019ac6f40ea29db9eb222d89187bd2044c1a1b9acc885f13098146da58febda0e2c23272702
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6745070d0cc4dadf692060e89fde75
SHA172ba7670a19e2a31e3fbb139a1512bb0c4b490ea
SHA25623b491c400f8c2008c62652635d88c25bb8d9e52649d1a7f08cd1eacccfc52cd
SHA512ece89022f53b7525aa56677e38f2f2a6ee281c4601fb352e3aadba406df37fe10700fcfd18dca01572adc7f08722a6d460de18cd7c54cdab48dda2bbc23baa83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd80379ce0b1e57312a556bb81c801ce
SHA1d743229e01ba9c35c86b361f2535b01a1424b836
SHA25654d894b6d5a701b09ed4cbab68f561a0fb00f15970a08a38afa48eb7331a8ee5
SHA512cadcc1b1be523f0216dc408283a5da8b523939275ead6c252648762a2d36727c805a30e6e26c079fb9630263a6d3d01ee91c2fce6d35bab59a87befce937605e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a6684bad70779abeb5a6508cf73e423
SHA19dcc8ae317370bb354047454d80103bc4832d208
SHA2562f1941b4237a803a924a34ab427db7dc52b6db187d6574006c6b3bb70e337ca3
SHA5127c089cad7eef109c52791fea2241a941ec10941706341ed4085223ad824559f3cad872df146e46d3558b7bee7d2647577ae0846a203650174cc52e68b9b5743e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b