Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 21:15
Static task
static1
Behavioral task
behavioral1
Sample
5db249d1a2420a3f690ddf974b110400_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5db249d1a2420a3f690ddf974b110400_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5db249d1a2420a3f690ddf974b110400_JaffaCakes118.html
-
Size
122KB
-
MD5
5db249d1a2420a3f690ddf974b110400
-
SHA1
ad2efdd309f08ea94a7fcdc15edaccd1a2e9c408
-
SHA256
4c94247dafac8456154152cc1ae236af5a4ae2b7b6556e32f18aac936a0185b5
-
SHA512
970b3f384d6375c9ad69a4b8885362d5ff2c792359c17538768799504793d663f9f5439fefc37167b212bf43212b559297ff0412319a7d3c78eca3e5e95287e8
-
SSDEEP
1536:9n/97SaLaG1s4vSVXvTBjR996O4KVtY4l6FYKp:Z97SmaKY/TBjW+tqj
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2083c2fe20dada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062974e5b5f804e45b98349be16bffb780000000002000000000010660000000100002000000079b69081384daa6a971f062bd920aaa1f5f712e0339a3d6c374236bb45eaba25000000000e80000000020000200000002a5a38361284fd9b357880a2238b9aa33f8c74127f35b76ad9a19b400a7781c020000000fb6e18fc2fbdc1e00097de2de441da2be4cdf85ffbb727a441dbbda707f8eb4140000000ad324d97c0d071fc2c674f0c80699ef70f602b5c5a096656056724177d19e68acfbef58babbf5ef2f3e44ea368c517135acb3c06b768af1832c01dad474ca270 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{11D0AF51-4614-11EF-A248-D2C9064578DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427585615" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2956 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2956 iexplore.exe 2956 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2704 2956 iexplore.exe 31 PID 2956 wrote to memory of 2704 2956 iexplore.exe 31 PID 2956 wrote to memory of 2704 2956 iexplore.exe 31 PID 2956 wrote to memory of 2704 2956 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5db249d1a2420a3f690ddf974b110400_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2fae74c3ae3a63abe5f2c0d1f3a18ba
SHA1b8e929974b558ac08df8a70459d719f509c97def
SHA2569fe169edc1103cd9056f6e9f1ad8482505faebd9b66df07cde06a08b390e794a
SHA51281cb7ab9f63f81667a071c9905e763e75d9349e3cf7d028c6481ede7248fbbf5a342c50a25ca7d592b1fd68c8aa5c05ebb5ed07ce2198a5de4ae156de0317e07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd0332cec9e092725c02dcd6271d65f4
SHA1795ba46773073f44e0b1fc63647dbbb697fe4576
SHA25693f3bcb675118ff778734cf8f6dfd5d210ee49787667bfa39008c94818a3390f
SHA512c5a3b8a74d86a242aca144182d685872023c31fe43cb69772c13c7e3dbf7d00cde97228bf0b4e7be9a7446c02f00583672f55b33aab90cd7668c8e7bb0eee0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e4996d1d0d64eab0bbe3fa7e8af6a1c
SHA17055b8a73a0dd3613111873f544723a0f9ea9b87
SHA256551a8bea6b3c29471c082b068ef8c82ae78ebea75f2dad3ecc969759860d86e6
SHA51239e5d743feb4a68f804b39b400e3a3be3c28153c08a6713f91408aa26ddc749f73945309b1527b4a70a4755726c2f08b0a09ca11229951bb2de21f0de5b64003
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545375de08f52a3667dea0094dab3835c
SHA108ad43b91b4bbc6f40060bc7b6bbf47524852254
SHA256d140b3b21b6394d7634d35dfb4e8dc509d7e77ab518aa77a6495fc494107bea2
SHA5128a2710ff0c9b02c4228ad0e97b4cf4e1998fc292a65361538259f859494703f61a1c249ce7f4bd98753ad2642ee211815ce5e274935f8239ec856897d797de4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5437bc149fa22c44f2223d908211c2b7c
SHA1179a54e7f88562a19fd8c3797c5f4c11bd15aac5
SHA256661ff0aa878096ba75cd7d8b854470e4ba1e849731fe71a3c7e21791a63ad5bb
SHA5126aeaa3f7d53ce6b16a3ccb1307a7d404952e06f3c7d8862595111730cc8ce16357e2920867e13c6abd2057f7443bb707b32b3a707fbbc168f1e65c9273637f66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD512c0f45628593663d824ca60d7e0456a
SHA1118550cd61cd806f7f4168b1b3ee478fe7ae201e
SHA256001ed2234c5093f575bfaa72a32f7d5f58eb7348d5f2992940d2b8ba445e30e0
SHA512ad13941c6448b72c478175be6e4fb051c4889bb1e35703138a955caffe582e689fddaced710e0ca4ae1785cc99bfaed6153ca7159165d6d40173ddb902e3907a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d13cbc36ab02382397567cef5fb5761b
SHA180d205777089a4f9a412928b82fb90be18592269
SHA25679ec691064ae599332e278a221bb5686df029955837f8c33becf87805e748213
SHA51245aa46d8a3519493d943ce37a26f94c3bdbf4b968920a4028b3fccd9c50278155092eb73f4d0a5bb6d44073182e0f522e68e0916af698ff87c421ff5da245390
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523fd61fe9f8a11bee6192d8b9f4d15f2
SHA1a1163f40514f8cd96014086a95016961f62f20ef
SHA25652f73f32f29e274157d355b31c946efdc7fe6ce498da5dfeec9bc5d512d4c2f1
SHA512b15fceef953d6869a121d37912e8c78b24375021df01b0b8696fe22289f014e4008c8333cc955139b4c8bae5a537c56f1dfe860d443a8a0879a41bb14a808394
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d5909c43df1d652175aabb0ee74c85
SHA1389f663be17bad63c53776533b33813d03d8774f
SHA25660fcab1d145e2f597c2fd06caa26ec340c8f55d40661fce10adbe322b9e03ecc
SHA512d9e416f53fdc2fcf790a96e48240bd4bfaeb62e1314a7fd5934c40ea16ab8af673b169ef5a5b6da2b72accbcdd1b0dde7393eaab44508f142715eb8e1ea80054
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56475fd095fd5243a50637141e779b1a5
SHA14a85f3bfbe9c1cbfa21ab66f8e95aac661784f93
SHA2562b8f515ea794051260c92307dd6018e984a96c72218e4a0d812e3c67cb184cab
SHA5128e2206f5f76e61c2daba580258ee07de2f27fbec12efb572a7ef3ad112e55d70f9e5192fabb94e0026dca74d36e66cdc880742918cca6b38ff158523b178834c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5626d294bfcefb4ecbbbe7eceda200a9d
SHA1a145bbfb40837e87799a95590b7c4cded961ef5a
SHA256f7b5bc6d16462d169bd3903ae088f9e46e5348994216cd36cbb971745637aef8
SHA51225bab3d9348e0bc501edcb378b1c99c9895e403da91d42943d04c419f93bdc7d098a64752088ecf8e6743c46bf68aeddaaca91ea1bafbe3de7732b2cc279d232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aca293aae8180f9caa52198be03727d6
SHA1c5c871fb602505797c87a0f0bb60fed8eeb5edc2
SHA256c47e9599ba8d1e39b33aaab3741ae04424a9e9042cdcdfb347d93bf4c4b23c4d
SHA512add2a5215cade481d744a3ee3ed5da4059b4858cd9bbc11c52e2eb8b6ca3f8db65962a017bb12e07f4d7e9ddfe3270db43c325bb5ea0960e7c4f4eceb322b0a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dae6b4e2ab932debd95da5163b3577fa
SHA1ae3ef6d7ce98511bce97a4716e78726eb464a03e
SHA256520cec75bbb838c9af68940713ea2e5100fafc88295849e534a6db9292c5d617
SHA5129d88a70524987de1f3532a589dd5f7d0e58618ad0d321afbe7240f0a4f6ef9951f923087595c16828c03e9674e09894f72764fefd20646369af79e69d1474c13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521ece26672d91df3690cd32d5d0f54d5
SHA1c8af6246511747bb4eae8106f4a2d08ed21a07c2
SHA2564cb337265b4f2218f1394cde02c5143544dc5c10d259b324e226974e73ec5a01
SHA512fe7f5f51132f477c6f8bcabfaf588c0065874e526a8c14079f91f6ac5095b58b941bab1eb4d3a195abaddab2e5b3db52e17d039da9e98640ff233ebd0a0a6883
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51e25483f076e94155aee6023b633146e
SHA1585dd68c3b375c7f3f9ea0ad5dea4c5eb4986986
SHA256269874a5212bd66b5f1e32f7198c7246be227a9c11dc1eb73db48f4533710078
SHA512aa00e6ea23d79ac7f364fcc33a897cac2c1f2a926b438e826719d6c7c5a8a3d79b53f34753db3a0b743b520cc15ba90d48facc48c42f4515e8c0f6c1ae481be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19ff6a83745cc4653a3a2a400e3229a
SHA14c265c0831d51a3e48d1427bd0a35a45991d9f31
SHA256f4c62d59d6089e1f0ffd3700c8c6d6e1acd50ff1fcdb1e5920634b6bb1466033
SHA51222d9c00207eed6875c936691ab68486b236a9f5c2c4485705be229e719101875ab77ccceb27b45526492e7aa6ae6ff1124c245c3156c960ac5aa71067cf59675
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1e319449b0fc1f06245f1356469d912
SHA1852de9fb55b17f52c15de365c2fb726abf4fe912
SHA25631b57a3aff2380ddb7fce8226f728a6be9711092ad8c991e67fb38a6e6b52030
SHA5123cd3ba1241d805efb2ee6fb389e657eb375f7b046abff3e69df49bff312526bc820e3838a12987c4a1f06d51c92d9253848072678596ce1db1d0acb7c11f9303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa61d3929befc1732fb0e3a8f5300634
SHA11fb44a71c68c882b5a9b60685a9553b67a1bdbdd
SHA256927113edd0bf896eaaca8f294f93ce99e352c38208e4c4d73194bc443656506f
SHA512399838c87dccd477fa513ac05730305da1356f1f473838b066fa4484164321e40c50aa312e33414d07204936f5fc48b0a298275d4b4ed4d6f99e05be1ab08a95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578887cdba383ba7bf4cf01eedf762dba
SHA1be82cffe4d27fc604250b008e8e0ba8523947768
SHA25609890eef2ce3d9b81ba3fb0d0b1aef3b7811268e605ecc9773482c7b3882288f
SHA512f945f2750b710f991691944d634af1aa8f7f801fcc46182cb2ffc96e26fa03142c7ceb8adb8a3c41a707015b7ec122f4fef228074bdd66e7a8efde8c591db219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6f8c68f2320833f0e7cbf1de4c63028
SHA15d3419f0346a1e4f6a71491fee9ce44d8a6523a0
SHA2564a70cd71211626d983272b2515cd03c098c09c26bf0bc59524bcbc343dfc4029
SHA5126d4c7f12a23781a6a4d6ee299e5f8d958bccaeb09b9141d15b1c09ac1f317463f37e94c2aed89d59f825e83d9499c2ceac17796b442df4b65ba640b2c791434c
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b