Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 17:14
Static task
static1
Behavioral task
behavioral1
Sample
5ce3a1e9344fd0dc8162d778a5cb5c5d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ce3a1e9344fd0dc8162d778a5cb5c5d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5ce3a1e9344fd0dc8162d778a5cb5c5d_JaffaCakes118.html
-
Size
925KB
-
MD5
5ce3a1e9344fd0dc8162d778a5cb5c5d
-
SHA1
86fa04c89b43d9a2be03975988684f3aefc11582
-
SHA256
011dd7359ed1c683b2c6048c7676a8ad9e86fc1dc88db90596135ae68a29e515
-
SHA512
f2614ec9a15d9bf87d7981fefea4e36c19f26230cd6b2624f9a480ed309d7b985c0708eb04730a285ea454ed09148a90ea0bb5754a5400c15fcb06ee625d098a
-
SSDEEP
3072:UpBcyaE6Bpla76hBTmf69N5ABefWIGqSCnrq4EgYMambK4ye1I:UpB1
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb7800000000020000000000106600000001000020000000f87866f57d291bb0d50f25afebe8e19e0147ccecadbf28497a4bc088a8c2e7de000000000e8000000002000020000000edf1d570a20642c02d1a42cfe72cfa7b4ee53f55a540787dffc5fb7654be1f2a20000000cfd792a99d707f3bfe55c38f8549dd142fab95c2441f5dd5e9d32b05d9f2e2b040000000c1043866dd03dc772b1b460ec172e25f3abc415d6823b94998c0d070df2cb8ed74d518f136a834378c8ac0d047184a99271a081a3da8366a9ee40efc30e9750f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{68C35A51-45F2-11EF-B9AB-7EBFE1D0DDB4} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 50efb545ffd9da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427571159" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1908 iexplore.exe 1908 iexplore.exe 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE 1808 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1808 1908 iexplore.exe 30 PID 1908 wrote to memory of 1808 1908 iexplore.exe 30 PID 1908 wrote to memory of 1808 1908 iexplore.exe 30 PID 1908 wrote to memory of 1808 1908 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5ce3a1e9344fd0dc8162d778a5cb5c5d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1908 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5827010d41c2d53f4d762bd41d4350e08
SHA19d2ef369de6ce2a9232f50292d5dbaa024b49807
SHA2564caf100ae339a4821e266a4a68f55fd52f7a1600b56e501b2c983e2ee951547a
SHA512f4c910ac77d6de15f10eb02b8496f0935926af3e75fc6f797932ad6304c0ce96bb29d92046dc9694badfa45ec510a8dcc0c283f7951df03f8ef2ffb5def676be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d0fd348b59ad24b9818deca84c304fd
SHA196b524844f89639f290d2db1f65560ffe1479766
SHA256b24e23dae2d93a718bfcaf82a1f1766724ffdf3e1271009d35aad55f5153d820
SHA512121ccef8f2b94b6e5783d30a3b64a00b93dd537418833a22efabd72d9b575ce75e5016ab71956581d37582e90d2117e31b74e8837192d5bdc95e8bfedc5ec9e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5926ed3b74b6b0c96d008f74c60740beb
SHA1ba46c9b473928b493745b3b5d7fdf913e633c69a
SHA2561efc02854fa8ed05980fd180e9e940f55521455d88a16144a06a708eb29a3eb3
SHA512712be5ef907838e553d8153cb4422870c17888059b39d110da000e2bf7dbf47c17d5d802458d9ae3928b60c4ad1b8c5bdea84d03fd1834551b698da67a46faa9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50cd08dba828aa9f711b8a2a0b9e0d11b
SHA1e6df48d4033e08e9124e1b702b83ec52d73e8d8f
SHA256fe672256b5b1e5fafa8b46d6eac8dd7e8aabecc98d3d894800a7897264ad5f89
SHA512d33991381a44e47b62a53a7c4f7b6a1c4db3040d456f4d0d965159e3de437dcb6e155fb4651987bab348227f84ec7c7257e96e56f0d0c165e1addf8c359fa02e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508f7c78c54f1976037a8c7855eb3fdb8
SHA18236586dc7f2b91deb5678ce5e5b831a63dc058b
SHA256ccb9aaff4ba1755db7c19e8b7205b46cdaf9ae561a07c5ae5d761ab2c9130aad
SHA51269945ee62bf83f19f4315118d519c92da26432de2f2fd7dc223505a8b4329b9c7c74df4aa592490d92914096b16183e521edde1c4bb197c145472bb24f50f15f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b485bf5e2ad1f19892f8bb9f385251a
SHA15840452fc10ee5e71b1310f081154afa570227b5
SHA2561653bdabe0a7c4773975729fccfe1cca9777242b0a2d94cb93d3266e33bd46c0
SHA5120d7ee0fccecca540018a8d055a47c3e38c05b31d7992baf603272ad5763aa7b18bd15bffa3f7433124c372272d4ee4c986846e4aa2b653d6bacc59c622c9057f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511ebb409a1acd17ec74bf19ceb67d1a1
SHA1bd64051a94c144b2ac03e7fc85e4d224c6ca576e
SHA2564434d1df3979a8fd2f041a089dc06d3016345894cdc377f39a157aab457be4b9
SHA51228b724b1e87613d43bb437ed65920293b748245c819646490330104b88be940822d318178238223caa64f1529cd45bed3ab2f3098fc74d40d721c62b2e1eee4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53661c72276477792d3a523dd9ed8b80a
SHA1616433b370ab3ec7e59cf9a64278b792b1a28b10
SHA256be35e4883e2e9b469d2abc21e351a65a657db8602fb507a048c9a10f025d37cc
SHA512663d0d6f1d7f78ff932d410adbdc639e1206abb86db5bf38bfedb2062624d8d9de7445a5a7d92261d69422a875d8003f5121667912020a31d17f36d5ba340fbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1cdce46073ff5fd5405596742b0356b
SHA19d90853867147b26acb44f7f84e26b6637419e95
SHA256644bc434a6e0b646ac2e003a416bdc01a5635197928152101c94af826419a9fb
SHA51299da0405a31e3f26158062b4ef179f2a540b20505d2d2bb167fee7c5be7c0a85318f8999a309f1db191f5d3107037bc10b4bf5d00158531d51a0e1f81bcef118
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de65c446e7f91949d440c3385b3d5ff4
SHA1839c51ed9182c7be83a44061995bb764e693e968
SHA25620d30bd2b54c3d9599d837b35220cb6547e91a07107752b938f3c3aabbf4059b
SHA51227fbcf0daa7c6104d46c1421869a2177d9020ec7d0e5a46c21917265800208b0f35c7d1d4dfb07f7f4b47f33ca54a0ee6e8207b7c62b23938152a0d36b7861ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532225daf2fc8be067212116473306f37
SHA120c4fb1c3a31f160b11a412161612c4b1434cd45
SHA256b733bc84f7bd1af89b1690a4dab9f2c582646f920fd7c8360bb3df3f9971c16e
SHA512ccb1cbb3a85aa1b3317d9e0846a1a99488806853830c755d321af6e0e6575477df9af4291eb4ff500f46b525342911c754ac0c7ad4e4ea1178a9bf26ac3c5e92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd758d8415f1f8425c80c66cbedb1a5a
SHA1efc4598661b0750392f7f310d9310c51c33fdab9
SHA25678c8ecc56186a5d23ae76b7ec40084cb59ed56d71898fc4f550fb4b904165b7c
SHA512f4529905c616ff6032529dbd0d5b1f061886ab4311585f88e28ac4c68ca1268bd58a890305cfd8959573a6efc9c0d689218d7694521440cd641ea1662d86151c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b094288a059e94da1239cf31477023d8
SHA1cf653e8b7f5f450b1ba3c96c55a349265d56808e
SHA256b78bfba2d66317b9597a23d5940a8353fec81a8ef5ff58fb2073230e31126683
SHA512df8c0c9f2de3f6e6850f8d22b4f5731d502c5ff54c457f885d16cc0eac7e8292f960831fb60d4179e9772895113a3fc92e38b40fe47f0119270c1c5c351acea9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513b46337baabf6dee3c6bc32acdf11f5
SHA154fd0c556c41ebc86147b8749e4de84334c2eade
SHA256da30d2d47cf2a6445cee2d0d1bde6246ab4b3e4db42737bd14873649aa853547
SHA512e4c8be0c7a768b45ec402e87115c27bc29fcc12d3a675bc2244e918268ff7cd4e57d9773629d3523909fc662c3b4a065c6c8960e44e86662f7362861cd121035
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599597ec1b0099d2c8fd461dc958ad221
SHA136c74cf78083aec9440b92c1fd5529af1bee067e
SHA256f6cc1111763d74f337952d801ef0433795056aa4d2c8ba0d4f6ba5343f724e84
SHA512cb16187f57c4b949cf61f0c750700e3b75856e7f79b6056ef54be0e4c80b3b7bef4b9864600b4c3a8c6bad7a77bc73d533a8863a603ce06287df4805b0781208
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585e39cb7de4c7a86ac1e4993589b294d
SHA14d78333a08a5e184b3936d1aa5575bc92e10a625
SHA256e01de9ceb0e04b486348b38c755bf31a95de0a24419fcc03344cad83a5b9657d
SHA512762451a6f5247ec66e881e831932a1ff544d381bc94be7ee51183a2a5880b78159ffa3a0338e6e4e559a73c1273cfdffb3c84e7f4cb820fb5872cce236dc9192
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505f48b96c06d862ed4261570191604a7
SHA16833daf2cf1880049533982c77e322c63b71e6e0
SHA25605667b792c7e482cd8ca9ca781d2c80ecbd70fc99ca1620a194787c0f373e832
SHA5124ce682ca53cead841f1f04954a0b097a9b67eaf376496938feb2b49ac69f1dc606c1dbdea22c777d781e29619d59bcacd1e2a5df18838711ea44fbc71d3fdf69
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3H1FOMV1\platform_gapi.iframes.style.common[1].js
Filesize55KB
MD5881eb3704191d887333d08190e37b9c3
SHA1fb5f7a2259c6e2d0a986f1df7da0017f6f4bc198
SHA25603759f99c9adbff1efc85f512a97546207efcf91894a08b131bf59c2e2b95206
SHA512860ce2d7e2ee0a1eea2701af9d0e01659508e26bcbd2b4456bc926fbada737a067fb5281085c00d136f6294964cc2a6764ce2c12cf3fd32a0f130c117a6e3191
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\cb=gapi[2].js
Filesize135KB
MD5cb98a2420cd89f7b7b25807f75543061
SHA1b9bc2a7430debbe52bce03aa3c7916bedfd12e44
SHA256bea369fc5bdd5b9b473441583c46b9939232bf1f98c1cedf6bc2241c4f5068d4
SHA51249ccede4596d1e5640a9c8e8be333f9c18812d58f02b2b15adb54172df1387439e9dc5afc4ccd9d8f0f75f092318bed68d3cd577338e88ef4f9373de8a07c44e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\X761FPIN\f[1].txt
Filesize38KB
MD52ea35eca760fdc99b31a45430f7777b6
SHA194995f66be75a805b3b38f64af56fc726adbebed
SHA256e63d2e2e2ea07d657c5a2118c818ad8651122e99888ba2703bf661938b0c7534
SHA5123a3e1b6eb4bf7fce811d0ff4c5105b5015f7c682c9a5779621fde004e888f2c8855fd0f8b2686bb3d0a95a0c49a065b53d43223019187135b31ab102bba6170d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b