Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
5e5c280e78f48cbb27f01c442063516b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e5c280e78f48cbb27f01c442063516b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e5c280e78f48cbb27f01c442063516b_JaffaCakes118.html
-
Size
55KB
-
MD5
5e5c280e78f48cbb27f01c442063516b
-
SHA1
469d92a4362ead2933a66a908a699bf02d8fd376
-
SHA256
429be4a2e0154e68dc602c72b5da996ef3857bb890af1fab6ecea11268fedda7
-
SHA512
be8da8176e6643565ac1a0dfb771841028bc5a02b0e2a146b61dfaa6236cd0ba0501cbff9b3b9a77e8009c6417b81d6961a1c189dc5ad9cbb7f21da573363095
-
SSDEEP
768:S+rLQo2HlazcOKky1x03ykPPT/fo9WRAEIPjauIvH11IvVYcp0K:S5azcPky8T3skAEEjauioP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AB883F1-4630-11EF-B3C0-E6140BA5C80C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427597818" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c000000000200000000001066000000010000200000003d9d3c8247e60de7ae282338e2a7bfd83a40264b4c339b3610d42dac08c6439f000000000e800000000200002000000072f4be656bff85a469ce06fae227b091e99fc6a13603640e06abfe02d756a3bc200000000e6e40412b24b7076618700fd76e8c37af6499bae58ff3b2d364e8b3ec235c5b40000000a3645b700f0f855e46fdf57150a23949cc93954a3d0cfc29f400c889130ecbe5eae1e41325f0f4947372f6b924a48137d495ab104f5edb13effc627541ec8999 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d8896a3ddada01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2676 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2676 iexplore.exe 2676 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2068 2676 iexplore.exe 28 PID 2676 wrote to memory of 2068 2676 iexplore.exe 28 PID 2676 wrote to memory of 2068 2676 iexplore.exe 28 PID 2676 wrote to memory of 2068 2676 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e5c280e78f48cbb27f01c442063516b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2676 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD556c2dbb2b33114b8b6968f9ac609ba71
SHA1eb6f5c2952c773d987110c6f854a18b1d792760b
SHA2563116ba058544bf1d9b9bef12d9e124cae9b02554bdc8f90ad24fff0d380ea824
SHA51219607f799d1a1940b0ea25f85f9dbb035315efc16b8fcfa30fedb99b7ed3d80aefb2697cfeac883f8f736f70edc990e976b888ab9d4ec7244aab4ffcdfd2c7d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54a07e8d21f0c91464f674307ffb9a62a
SHA1464676a5e7ad54ca6cdfb285025e7f6f595d5501
SHA256995e4f1a1d9b492ecd22fb6ac12e66effe5cfd7f0fcbd5619f92fa742feb2964
SHA5127f301e07796eabf35e6a30788d70be993692d97e4965427c2d3d0e4cf6e7d82cc5e43bd072f8d10f0a0516a6f881333c52b2747ab037047a2ac6670d63dd9bbe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c62ffae80034f5641de8e6c14b88d636
SHA1a0bfc04767ad43c91db60b41964795a878b3115d
SHA25699dfd27a8f57abf61a339341355584e62a8250308924dbfec89a60e117f55422
SHA5125e855c4c3ddef7ac3fcf433a61cbe964a522ac26ae9aa828af2cfd12348bfad74f55e0557811d14caa96f7d563719ffc3e6399461fc9896f3c2677b3e8cfac46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f36ddc2fb41a94007bfdc11711dcb940
SHA1e0452f708c745174e837febe4a99894982081dc0
SHA2563fafc8ffd67a42a2bc57b76773ec566fbbd7b8b19e266b9a7e441e7f5116ac69
SHA5121cc76733182340e974a9b31058e1080ac80b3d80cc6729928c3330d689d3859e0610d65179fea706b3f3c225ebb9356f2f9e9ae9dd3d885df8a79661117ee565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b694af572fb795f884facfa64819c4e6
SHA126351dabd15f7292ef93b7d5774850425c062dc7
SHA2569cc27592c49097ea90ab280b74e545e97445a59e0ef81698d2a01abc85b045ba
SHA51297b1ab5acd35f32b241f707f64ceb102711cb47f8265da76294ad8ae8301d96ed2780a2a0d138030c7587b448a9a8124c927b111c59afaa6500f31f04ae00dc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59780340749bdf51789db72920978a5a3
SHA12dee6776486babdd1ad5a6c28a45bf93772ec3ba
SHA256005dab2fb7c037a4ae5a941e6afa0aca357a603655ee7e071383be506b08d727
SHA512ea9f630888aec1af722ef08fe9332004497ed265cbd0b6494c33ed66125ca0ddaebacb7d0ad6920b1f46011884972d58f2662d9e27800ffd106c45b6850c8327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d87e7dd59744d6a6080789ce02885f02
SHA174dc78f5401493525756a47f7137e43d1718daa7
SHA256e35b4f27e92b152ce7433003581c6fc683f1854a6ee845651ebf439d9efd76b2
SHA512ffa3e5987f9ef6b002b5fbb1362db037a924c5549d988d2404bcc29e73535367af140b0437a03fc83fbaf9eb3a5209741c4e446e3c64f37f4bd5b7d8c3b34326
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD51b0c8ce6917cae798ddca86920d5b6f5
SHA1aeea0634a64bab5e09881f6111dbd08e8bb19313
SHA256baff8634cac74154d1a330b035b3b9022a2d7284a9aa00e7635a5861f3f54739
SHA512cd8e4aa121c1ec41c142139b5af28f058eb080b410afd150360076b3c4f91f77b55f8bdc3a7c9a538bf8f91d2393181b0fd34dce51ee270856b796b0a12ce169
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD556829e92efa51d85fdf52ce42e53403d
SHA1e3600c48f18852206d43ca1c2aa95cfef717ca7c
SHA2568993181fbfb8db6c8ee8881d2d515dd3e36c69b49e6ecc383672ce6f21010901
SHA5123f5d73a61ce4e7c31e178c3ca9a233ba67aef10a27b0fc5dac1e3e7adeaf256325ed4a390bc29c050fb61eb47dc6870942badb9bfbc76ae3034ccbce6b7726ce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5560f80bf25d2e08334f61a08c23d9916
SHA1952fe15134078bf2a1462d1f173d2df79e80c1c5
SHA256109f6fec6a69660c74ff423c9f4a60ea32a63640a5b70acf6bb55dce1debdc41
SHA512013f2b89a8823e2ee3814c8006515d8136bd80f520feafe483c61f1379343f25c4b1d39ac5da5ec9f28f182fa22983611c52b7c4df72ce6f407bb991d9541359
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD502acf957aecb83f5688621ed9c4e71b8
SHA1d09927ebc4a579c4fa2e168942615987e4cc4910
SHA256788d43d2bbd64cb45e936dc15302778a8c35a081d85b1eec309886f560498ccb
SHA512057117d6a6d99336ebe67cf8ba023ac7f56c54af9e12cc2f121e68c409f1016630a559831a2c8759a711c268ae831f43a2eaef0b6a9e8b062d56009a12d20908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53276c77833561330950256929861a61e
SHA1531e1050e06105b4c20096609899e0dcd6e8b177
SHA256a09aa0b03f16e2c7c1108ba573098127d92bdea3c9fce8caed4c70c6a081c0b7
SHA512054354fa7d8a28bc81e6ee080f2646bd97769c1078f13a934ea6f8161c84c3d9a15998105617a0d8aa45ea458fdef83027a281ec64a58940f5c0fed5cade04ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba45b24861334e79d6c777148c5ed265
SHA1e5e79546636d0c6c51b20b5739f36002070411c1
SHA256a3a9328563d6d91ea9c57dcfd83d404979978d655d1e0cdda5060e4fe35e9619
SHA512953a682d3e0be9915be7a6ec94762a94baf4681129ef2d8fbfec6a312447ae40591ab4219cc68c648632f1c5927a6480d4c29a77dd2a23359d143f1693043182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD542914ff01950b4777118c770f762edbb
SHA17a93a717998875cd15526c77af82e26a0661f287
SHA2567b440aca199290278dc08c6b483c748622e9a33763dc22289b6918b0e5facbd1
SHA512955e9020c00d1b111c2e26e302c0724119bb50269551e347ec512875507d1a3f16e4048a1dd421a6e03313fb29eb3e7f45028702bb38811c465ea3049d09e070
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5889a85f0f6b12262f6982ed422f14e6d
SHA1d87dabf9074ec5986a83b83b5cf7bcf641938a20
SHA256d3f03b0247636e5054609c225d676df673e82e5acbdace86e56e9030a9d7aee1
SHA51285eddc867acd350dec8461996fd6fe8c90ee294a491ef9fc6daf211f9df6d6421b6a0c85a392d0b653c3d6c193bc894b3e9266362a9d619bc2fc4b9f5670298f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD58355586f0a161b230c12aed20df8188d
SHA14f74cbbf0b4ea9a63afc6493de29636e832cb895
SHA256825f06d37c648c47e0120646aa2b79effd92b17c9aad8cdd0bddcc66d7554e5b
SHA512b4cd2433fc9aff87aeabdb39c7674931df46ae40a02d3fa1f60b5c9b5b4695fb186557adf93624c1a46635182461fc15ddbcce8b05a9c6949472957ab659726c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d7a1fa61dbf577737ca88661be127456
SHA12dafd4eefc4f021ce4f4efadcd37b29492e69f39
SHA256720800b067829f1206de4fb92af8de61c9dae23e5ee00aa8b91633c62e36b760
SHA5129a05bed7024bce4010186f4fec68513565fead824a735c8b1a76b909c127b76843b8ae35e5535e53edbce8009bf492edb03af152c2c631c64fcf0c73d8ff993d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57b7d1da6c1df7683a9f16a9f32905db0
SHA16877b56ba16638bf4bf6c8463ac416640988daef
SHA256d4b0a4ef0a837269d8557ab697c71a6742c213ff242eae9e100859b783708979
SHA512dde8c2f13bd45bfe24582de677c3d1ebfbc1d489371eb96319d89873c6f63837411c99261964535ed6602aed2821d8b41a71e6df57e8adea453628d209e9d8e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d712c22c99a54dd9492529a141177644
SHA1674623269ad21a32dd09597a7492c6e5f37cef26
SHA25690921c2704d3eac5ad16af8f94ef157ea14199549765ba2a46d77649f30ef58a
SHA51281c425ec17db37592cb31bc3c795102685839d7122fd570ee539a81977f7eacd4ff66682426328a2bed64770516c2d7b43b478bbee7fe04531640d1bd74a68d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD564544f801960f1b4ec0d288e93caa0ce
SHA1d3c2030af35aa3d6e2d8d1a2abb99720d40c87a4
SHA2561a6b079bb00c703a727f9b21505778cd54b5a9eec1a6bfae1164f87a583e4497
SHA512cc4b924783cc388f405433583bc77eeb5e5792dd90fe9b64ea85f3ba07a2f7fa5426d86d8e0e3565830fa9f39a2d5153d8e06dd4ad85a8a8907969fd91756a8b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b