Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
5ce02a755251a9f556645fc70da7f340_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ce02a755251a9f556645fc70da7f340_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5ce02a755251a9f556645fc70da7f340_JaffaCakes118.html
-
Size
19KB
-
MD5
5ce02a755251a9f556645fc70da7f340
-
SHA1
bf1f8465f0416400475b47c57b694ec28d179aaf
-
SHA256
d2527176bfa7d8758c0d51cd74a068d69be3b34ff3788d457e4a59313372ba1a
-
SHA512
9ff3d77dd96dd866f294161f3972d74e5b8f36e5e781110f348f6bfd7c50fa285ecd148d11f5c2666d5d2fa513ea0354339529e1080ffbf44941877ffa90b791
-
SSDEEP
384:4+QfPFd9QZBC7mOdMwatKfpC5IgSnbmFe7AcGP6NGLDPd:Zcd9QZBC7mOdMwPpC5I9nC4MPd
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a3d5a058b71c4645a1a6b8b9d2c7fb4700000000020000000000106600000001000020000000d6749fe110a56d8968e850138543662acb0416295df2e4af4c19e5cd49dccf64000000000e800000000200002000000020d245f8492f75e0d98d02f7db55f7393c733c00c9603485d3128162e173970e2000000010166ee56b486d37148904d486aae7c056675b5145242fc14fcc40dbd1a7c17440000000d36ed939bc86f50f562218462fc7b78834970d58d7a4fd7b8ad24b5929a87ce16a6de6ad14d3cc00bd97bbf209f2f15ac936ed5c0d1d3e9e669dd2976e0efad5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427570936" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDBAF7C1-45F1-11EF-BD41-DEC97E11E4FF} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 809154a3fed9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2644 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2644 iexplore.exe 2644 iexplore.exe 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE 2764 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2764 2644 iexplore.exe 30 PID 2644 wrote to memory of 2764 2644 iexplore.exe 30 PID 2644 wrote to memory of 2764 2644 iexplore.exe 30 PID 2644 wrote to memory of 2764 2644 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5ce02a755251a9f556645fc70da7f340_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2644 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5469b10174773aa6fad16629ca832a9ce
SHA156335a834dcaa1adb55c4b1fbed462f40480be2c
SHA256dbc5ba53f7a96789a2071e13544ee989172520ff259a37e2de43624cc15bd748
SHA512dd6e56ed904a22ac720ba7c86d6f6d9c86234b65fa107d06f3170d70ac6be9a865045240145b2e68cfcbb9ba28f80213734b8e263db73ae862184ae7267a3980
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb969313ccd41a6f13ab5f1ab50d74bc
SHA1883d11c8cb910fd97f3eccd1701ad7bc1217819b
SHA256aa05b5a0fa36e3a6959c09db7a0c771b56016ad102ace78d3eef2b5db70a44c0
SHA51258e0a6b52f44f8dedb576b816ecf3edf986b843cf3f17eb3f813a3d108f6126f49666ea407e657826cff4f8d72759b747f92df0bbb582ec738ae903cc4bb8edf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551e7710eda057b6052bc6b6a2b8b2842
SHA1cbeef2e99173d3a4a8b563ec65c4f3c5697d21e4
SHA256d322789e9bb44952c5dc24bceeea1126f0c1cfbf39d1f6a3a840b486b29d4afc
SHA51296708f8155beb54039ccd695173224229ef16a6f372ecd7f94f2f65a6c5af465a1a26beba0a46123cd06a3b1b0846a8148fa0224412c74303e22f6dc6abd7de9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e79ed33a790b1f59e7a89f811544db99
SHA1da075e33d78dd93ae5601a796b81ebd0b8ec62ab
SHA2568f402788427012f1463df60c69d2512e852a2093cf0fc07d87964f0f95932a9c
SHA5129d7d860cf9fe43375896e6be14499fa3c9ebf9480d8ab5050f7d5ecb38837535c78efef417eab701dd301d921b5e5bcec3c000d75756b4aed36af0b4c88198a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59488be75e8cf808a6c3c83a101325576
SHA12c630c03200cf40f1f151ba4ef809865d77480d5
SHA256b91d1aff9a569bb821e6349130b1502b057ace442d152cbab1ffd809af66a706
SHA5122b61ec1a5405574ff7a9facf2782f6f3a07e0495a30054cedcb071bf5e8b7cf5b1777e6f02cd0e7f3d35498fde4b6e56cd9eb5bf47372da9f9399e72c33c0d57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7bfefc427ed240dffbe173ac2404b42
SHA10c4b5d19b96fe7cfada202a8da29e52c0da01f32
SHA2568b43751f75617c4cb8bf13425159f127ae05fbfae638b3978b9baeaa942876e6
SHA512ace936a23275ab4cf11f38024d37158dc929a7768e0c6c433a6f86a24f682d1f66b7f1f6b27f5c2c638ee6a5dad0be5cb2be8fcd5133ad52e4eca133603d415c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d342c0d08276edda9837c2571bfcbf
SHA1e992da30c901c184e024d8ca8a08c8e8a29728d4
SHA2564b2e41870462d09e7278cfc670f486aebb5f0f5ec4e6781ac523a97219e9a307
SHA5125dbba45986d0b0f99c4597824ff6d83de4fc2440b26b46a4deba2095a8e4e4f35cde00d0c7e674c8bfb74829f87bd076ecd2c256762d6c4cbbcaa14ddd009d70
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a53c6c81d4d5cd351d6b382f18b7c7ea
SHA10c08dc0e4c5b43316f57bad070092d5250a5dc94
SHA256fd707ac7e9b77741ae61a60a4e221ef8186f3aca18bf7aaf6f3f01cb16918bc2
SHA51283a0e637b8990ed8e1556119b20221ce3756b8abc355e4db7543be16806139e28d6f8e739117324403e82f9231ca9512da9693a14d8482f0ef1f1129737f5a48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55768b39958d9071cd4599b41760f2d0a
SHA14f11e20e50174a2180bb465adb20de92d8005265
SHA25669a202e6799fe9657940e8c3535525a64cf934442f8fbec882e13df87c503108
SHA5127c14977a71480c8ba057fa1a6f7a9683892d340c29457dc7feb6983ffae7c27d2ff45c0a7d4294415d278e0d0d815aaacc34f5275df8e13d9ab71fd32528ae17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577dc1e7317d163de5844daf066972f25
SHA1f19bfaf9816ac3b801d6d3c58b741125336c2c2c
SHA2568efee6c3e330fc2df49643b5618d1e462905bc78a90c9cf8a2ab9f90137b90d7
SHA512332f05098301344e1dca52452243bee47fa0d48d9c43325aa90670a2ff733855d319ab4eeeaa85856b45809879a68ffdfe91312ce2e516358b82f676b302bc65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b19e31a633bdc23611851db8d112b8a
SHA1689a1e47e5b1647032ed5129e894d1c897e48e4c
SHA256dc46cbc30d0a12d46a1086fe81d0cb2e0b44c1b744a992d00ec0b9c3048adbc3
SHA5124eabc1a01d500a8ed3ee6c42997d64c8dd552eb837ac8ec7dd35cd4361c9fee2ddc1593ea8755febdb07f64f979ad43802acd36a4e7432e5d7124438e17177d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807693b7c27105887a49455e7b32639b
SHA1fb1f7ad9dced788fd52ce1b300f72f3b598738c2
SHA256078fa305d318f4774aaa60fe6a102dfef7a7362b5345328dd0a5b7891550c2ad
SHA512d36b54f76bd87d4e89fa5e9674d99851fc687d84a3f1c3594984ee732a225f665cf678eb7ed94da709b6cdaf23e27d1eddd279c8af3c925e6b2e77232341143b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b