Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
5d9526e891c6a8eed14495eb69c10ec8_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d9526e891c6a8eed14495eb69c10ec8_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5d9526e891c6a8eed14495eb69c10ec8_JaffaCakes118.html
-
Size
31KB
-
MD5
5d9526e891c6a8eed14495eb69c10ec8
-
SHA1
4a58ec5ecd44377905931a861b9bdb009f489c57
-
SHA256
e933773ca53ceb2fa4422187097bf443f411894f2662b8074dced2403d577b2e
-
SHA512
0545ff650bf9d68208a8fd0365f0956a05583c96cad14670b52877d64acba6fde0e3796eaa40fd8caa3c9f5503f92005879e70287d9ffb557a4f7d61bca76ebf
-
SSDEEP
768:qXKqa3VAPesJhggFwcDSlCceNrwGSLXdv9qW3qCEuX:OKqvggF9SlCceNrxSLXdv9qW6CEuX
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2582EDB1-460F-11EF-BD32-F6C828CC4EA3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 604c37fe1bdada01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427583511" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bb7c5835718279428690b074aa627b7000000000020000000000106600000001000020000000c685fbe8d4c5929137db038426be6c3e0d3644066e4fa05255382f32dc788059000000000e80000000020000200000007f76c9b24388c9ee907063b7bdac6ff9417cb89be7f1fdde8354e6353dd594b820000000effd49564489b30d7121ba08344c4d45752dcb94139987b8a3fd5411ff76be894000000066ffd5fa2f562ece5777fdc6143eaf2f32532cdf2b4274bb3a8ac18cae6ee5cf16a18a39c5e67022b0b8386d8ad9589533bb1316d4eef7c1d6718b0998f2abe9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3040 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3040 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 3040 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3024 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3024 iexplore.exe 3024 iexplore.exe 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE 3040 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3040 3024 iexplore.exe 30 PID 3024 wrote to memory of 3040 3024 iexplore.exe 30 PID 3024 wrote to memory of 3040 3024 iexplore.exe 30 PID 3024 wrote to memory of 3040 3024 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5d9526e891c6a8eed14495eb69c10ec8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3024 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3040
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a8f21f30714a6e75dbb5968bae735bbe
SHA133cff9df19ef09bb66d87e4af1f9b63169151f46
SHA2565672e4dbc90dd677208ab247ea3db5cea08afccc625c1aabbb1144ef91babd07
SHA5129e7f3e092bf5e0f602bfa929be56884bd4ff57883d605ebd6fc7d9da542af1b1723a9b890abb2313b99c64df9967f51d83405ce1dabb463fff8b469c03b6760e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1e159e776215b79eda18687e8b7e0e8
SHA1f7ac3da2842554160f55044c73a331c6290b0d25
SHA25622082714a3631b7ebdd7ff8322d2d54da980b02570d1492f18d9eca44cf9c4fc
SHA512fb1ad862d3d0ffec589baf5035d4f41aa45f97e8ab49af2854dedbd62d81f13d8aead06a11e8425b49ae03e4a60a0c5603a61685a5ceecd66e48fd8fccd24d4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ad35a5ecf397c1f31c4fde10c404bbb
SHA1c6a8c0ff1089d7812ad08652113a58680b04ee44
SHA2565434071c105cf8ebfeb590a48f58dd86e0d71b4d3dd054e4bafd81d6c819450e
SHA512505c7f9d1782cfcb366f763070272289238a7d2ef83ab802f4971a471e6d6e9003cf2eb88f97dd7ce16cf0e3ab9ad21ccdbf6872539273c557b5f6015fe62a7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583ea693717e6a20fa8dc10a41c326f69
SHA1491aad1e02289199e07bf2f827d5993de94da461
SHA256780bd5bdcd45c5c26130970b96e52841e5eb6b6737639893ec3d50a15659f281
SHA512663ae376d189fcc6ac8afc198735ac28d0093a1ca1b949543fa4f8e5825cdff91e335c44f9af2f03da336d7e875f53909fb3c73aeaa39581aea7a5e8fd97adbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc6169df802f97142f262abfa0c89434
SHA13636383b74e0c86e996a5e585d4fe91fffdf27af
SHA256a4ff020290436594c28e4f6931fbfab53c70ec38ddd542aefeed3ca78a743a15
SHA5120b55f0815e7c7d8f1e8babf7d7ab3386401bbfa0cc3c840b688c133b4d90ea5fb7d77df1c8d24b6d877d2670228a3b01a827fd4e81f4d884a35381b3552a8542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5546ec01de4dfcb7963c6ef05f464ef4e
SHA1ba07f62a59c647afe1dc81407243d40626ce9208
SHA256cabd8e9d5b4434358ca8cb4f1c3ce7c6fc77e9097939d66a96d751fa3e73a082
SHA512b0e1e72b11e557ec2175a97e590617e10b18b2bd69d6c6c94a6ff35b2b0f0214a041e743ace77fefc474f74238a210adf697249465c58ea96cbb700a21679432
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5943cd638cd86896a0e179a3898f555c2
SHA1f7cba1ee98cae2c537c4c01d3ee36884d6ef16db
SHA256ac54d6538aed409508da97e98c40c88e893d705138b48d30d62b7723794e793b
SHA51230bed81d98827941fcb814a7a54d6762981a45b9ef56812b30aeb5b69d947af454170a6f1397dfd387f4153926391ea981e71df6f94870b66e101d0f99b1d570
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af0389c69772f7f0a818422662bb13ce
SHA1911a5ee26be63644b75d5ee55d67f6024630b400
SHA256855812536061271e348925c75d796796a427c9f9de4244b6eacbc21d1fc071a4
SHA512c17b64da6ce0aee8432e92e0b6e1bf4c4719d942fbb4883642b7e2de99bf94b157499de716e8654191943a3c4743505383d49986524acaffb7c05fbd7757f233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525ef522ff914db2b3ed9bcf123285b7d
SHA1d7e7d806c6f5ead0c91b7e7f5975f94bd57d05f3
SHA2564de2543c15da254a5fe19f8fa70b9b12c53c8c3938bac5f70c523b000977d64e
SHA512ff45034272368d1643dd199f022477eaba114df34d0f132c12ef545f25eb5e127e7b67d62133f38d92ac7bd3e5e66b021301e9843b6e4c6d470688c0e5e128b1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VOGNAB2O\ads[1].js
Filesize1KB
MD5ce9eed9a9bf71574b9cf93a118b69711
SHA114ce82b1c88e00e08467ab92194a09a416054a99
SHA2562e6c19708a1954656ad12fe7eec0af09c2111993549709c238ae4ebaea0990f5
SHA512c270a6b2736d713c966e9d55c79cab0e77334bd46e3bfb961497069f229e3893d67186236f54b7a76cf415c08056e7525ca090ae53636f95312cfe3886a99545
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XWMUP5AI\document.ready[1].htm
Filesize167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b