Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
5e7c0b55af7ba054f171484d9d616faa_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e7c0b55af7ba054f171484d9d616faa_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5e7c0b55af7ba054f171484d9d616faa_JaffaCakes118.html
-
Size
7KB
-
MD5
5e7c0b55af7ba054f171484d9d616faa
-
SHA1
a8595595242b6714431c024218873ae91f5be3ae
-
SHA256
e19a8edf19c73076b6d9d86029661b003adeed701d1adf624ae8edb4bc1d4c01
-
SHA512
7a41b30a673bea44eeb575dcd1a02df4065b3759aff7d2a1eed87ec564a91a9c5c02bb53210b75176625fcd100471ed9e9f1995f52d1053dba0045c701432be8
-
SSDEEP
192:rnYak/aQFYigB/GrqWndkh3MEnBw//TxAZYUiLP/13or9tY:zGxG8Tndkh3MyB6/TxAZYUY93e9u
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002aec918cb9fa9248b7812ac80df2e74c0000000002000000000010660000000100002000000068c2cc1c7f684c38e5d8172bb7dab0c82199a13c43658db7f153acc328d52b61000000000e8000000002000020000000cdb952cc99fe127b8d80cf5dc0f5b2edea0a5753d9b2493a11b8483982e810c120000000beffb64b98d14fa28dfaeb66214312fb75d1f1cf75d06654a00d1cf01ba88b36400000009dd7e8795bce761815da73d3657fe522a5f5479f31f44ae02c8b276de74e66bfe4fcfc96c0ccafa21dc0e7d5a9377a2222de95badc3faebbfbcc6503cee822c1 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90e17e2443dada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4D68C991-4636-11EF-8420-FA57F1690589} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427600319" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2556 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE 2052 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2052 2556 iexplore.exe 30 PID 2556 wrote to memory of 2052 2556 iexplore.exe 30 PID 2556 wrote to memory of 2052 2556 iexplore.exe 30 PID 2556 wrote to memory of 2052 2556 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5e7c0b55af7ba054f171484d9d616faa_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55c7b96ce3889637464b1837cdba4f3f7
SHA17bef315527b1614723266ebacb3a444bce8d5676
SHA256d3650a460217ecd780027c837635ce2150b400d45f6f41904bc1e7c1ef367f76
SHA51251a4e627404592c757d0ba34890df48d2ccff8b1fb76da789819ca4e04d14828526dd1f63832076baf5881c8916305784748ae65b4211490000b8e9b69ff4082
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e30bcd3dff2adee5cf6356c4190ce3e2
SHA1ef35067e60f560974918211882b1b3e36448cdfe
SHA2563bbc200af3c71b03877dfdcb89f13b9081e1db3bf734561fbba9d3b145f78a9b
SHA5128f7353a551e67f31e9e5a235a3817aa4e22ec1f6374e966f5dd7da859945d8aa99bd6d308460193abdcf9093558d7039e848953750bce7c05602e913ab3dbca7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5751f703d6a53a04149c3b3006360daf4
SHA161a7d085122ea4bd61cfbd1d85d299de5dfe0c93
SHA2566906c49a6def840fcc748e3edf0f26017c152d34ef88b49902d0399ff4ef5e35
SHA512b3f5f513d676b2eaee632ce43ac0189211e44ecdc875504359d5c02398f918a54a3d59efa2580bc915bcf7a6831b330e5b95f2c299c46643da62adfeea307278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d3ec55a3748835cef27a5fc7dc769d6c
SHA169a191a6ffea5fa88ac618f7752f6d44b3bdce29
SHA25653595e4ca38c1a2af68da553a1b275ddc0498476c754f63bafd37fa13b56e9f6
SHA51296c351e82083826999fb4ef280dcc512dbe19821b6156612fef1dc5a40604c8b68433a91fb3d93441344f88f727372d7e347e4ec10f5cac29e128b19ec46633e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD510d686858f3000831a4927e8a34fff52
SHA1e74b1fb7a34c7d57c8fab55d4e06025d8259e9e8
SHA256c02e1d69b7bd09149f44f73a324c5325b8daefcb04a9857aa4bea1e762fed611
SHA512114ec60809f433ed738b9a8b8bce555f9a8447f1533cc35c4def6c771bd60a1e466e378dcb5eab27cbaef2fdcdf6dabc02f5d8f2b6a968c26752706ae6d6f50d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5632adff3787f9c05d8c0741a59ba61dc
SHA1594108d60dbeca137e301553c49db1045e154ab8
SHA256e9137d27c83c56f461d6f95813948ef0a570f43363c06c3acc935d2df6618231
SHA512a0ca32e616b6eed31a34ad5f12778f1c46744d2845ee686c6fc8ba071e3aded7091e24e98eba14004d89a7fbc7f903a467309027efa3fd136ad6561da39695db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ae8cad3e60d0c98fe58975c70340ab81
SHA127ec40a86c30dd2d05cbbf16ebe025db28d06a07
SHA256725a2774b2179ee1394bdcc5238f33336a1a0888d945d80bfd9a6ff63cce2877
SHA51231cb85f4854c01f7e145c224283a1f79f4b22baa749945297875b17a850f6a7b7ab1575b9d55046bdd29d635b7760024aeec0f2049885dfe804f231bd00be350
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d9b1250b335f2cac85bae7cdebd54da7
SHA13daf74f71d31dfc38d63029b4084c814a6a71df9
SHA256c5636761c6350b5b377714f5aabd8cedf03ec91b654a1750bfae900768560e9e
SHA51268daf14ec837c551c378c433c42258100a40c8cc751cdcc8d6b5450ee0b13bb848a88a6f97f73f1c56e479bc4c784161adfcab111025f160b26523ab8803ef09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c144aafe531948bff5ef6350a4683257
SHA1c704805fdfe6a9a569d01ba9b323eac8cd52b963
SHA256bfb344fc753ceca55b6b383f2319e46898f1d6663f6ba5c1f8c09fc757a657b0
SHA5125b4f7f8360e8ce32082425406873729c22b98cb87786ebe2e084e991dbc8cebfa5963b81bc58b388dd31cab6931304e6cfe6adb703d8fcdd34789b90da1f7b35
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fd5d1df0935f0eefb085a2d76017d2a4
SHA162b9af967d4b477438dc4a95452fffb451a03795
SHA256a5356acfe67d6c55546110ab096209664d6ed7b9d992f357158998c10e4f5ef2
SHA512d82b1263fe26ebcb1c19e4b9ec241454339f2fb8221ea731c19dee5d7ba67c01a75f5335d4cccf29dde3e901930b3ee08a233b557d6d0e0b82825428fe99a3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f765c1c2622f1b8a29eaefeea3759dfb
SHA1e612db5d1ae01ad6b9879c9647aa34fafe667104
SHA25608e7e1f9be0239a0d6d4c861733b5ce070d571ef4565993b577bba915657fb96
SHA512f142940b82b671ce8ccbab622c6085002b2f500f7b752f9a3ac88fbe4c82810b72d6205fd229e10b511b050efe4ede84279e5eab8174151c1173e8e4f4fd1b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5477aadcd58925384c7373186f441bf95
SHA16b176170995fbdf34ed089a1b70e0f931d0dc0df
SHA256db62a6b5ad0b97d9d08a10522e3074be66874d612de14a5671b42d1c0d242c82
SHA5121fc4e889638ad8f1f5c58f45cd4227c405871939deff6d19b12f740f6eb1071b4f3a27f1f9b95b9a6c1b268ba7e885f4ee01b64ff56650540608ff9d3e444918
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c9af411518700e045ba2f5d4cbd7cc78
SHA19febd1629ff42f54de4b68c4cba35f488feb73aa
SHA256c1cc27ae129fba0671805b9f8c0ca90ba10d2da03c3ca4c7eb9b99d4d363d91d
SHA512af963f249f75cb6a25a4d56a4f276d76984d748c3720a57030a139599d7a54adc33a50c915cef84fbdcde0989e9d889986e46f3be224fab0cb05b982cee04537
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD543373d4ed2c0d0c8cde340e93a0a358e
SHA1ce0ff6ac6a225625ed92adebade0e3a7f743aaaf
SHA2567dc4f489beeee5b7b7965b40fcae569cf5902fa4656b6de2fe59b185834e51ca
SHA5129a4fa2e1af73cc22c1886237d105ffa83ddaeb0f64b293c1eaf4c34e9c040588df111e52e1960e4ddacfb8efb85e27df98a1ef3f368257d9d95aaae9ba76f8cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD563d321f2dea53f17b05a311783d55fa0
SHA13b998c90f05a1d316acc0fcdc57e4fd6996efa13
SHA25679269bb076d560edfda0b132badd1f5cc976ef2086f1a6494c318b80c21292aa
SHA512fd27176d665877d0347851b99d79ad000d2dcb2a558679a20b2c0e630852b1c9764166bab24cb4286ad85e99fc0749a63f2db60881d52b08565d995e3411b77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ab89b9063f124ded8f8531d70d070756
SHA16486db1cbbad17c448890f5047a375a91f2661c2
SHA256284b13446dbc186c200cfbd6230d1abe1bcd0ce9384070c47dd4080bb32b38c7
SHA512495ac32e32d64910a7e5f896d6800333878cba61e21f08b52e413bf156004afd2e81912748c072578b0a37ff1adb3fdd1d809529ca03a477a6e175eee50cfc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5e3485372016d5e490c40225593827002
SHA1db9a983720bbfc7ff4fdfaed0876a85fa104a1fb
SHA25604ae9723a512774775ee99dba642fd459d34056cda3b70440e1eae65f4774f33
SHA512658f2928b3c1664ba6e3b988a0a00e510cdbbb9d3597535975d874de9d5251638a0b23200e4d3b4746ce023c2c679078cf5df26ce15919c4d2a3ed780bfc7786
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD594640ad049e5e6087d6a3699fcea1565
SHA18a275c0f0ed98f111d9058bc40fc19e2b8b14be5
SHA2567360e36db97045aefc3d65777d74a4a6a416100df093a5719c05e01c0f4dbb6d
SHA512c60de9f6626fb0bf91135b6feff8ceaca9793860459b92284fe08bc938793d2208d79ea0774258737d8a8e6f5af90662892345a0a750627069c7bd9911b10182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b2f764bc376e8d0e1b94a15ceec40af3
SHA17142a7decd0da46c97a8ad8838ae4d8ca81f8c7c
SHA2569ea9c85cc50ad83b7314dcc5e6fa673e6631989982b0109b8e48762122dd44b2
SHA512667489dabdcf062596aedcf616d330c60c619bcbf39e46a04828bd5f957a0bd67489cb38b40117ea78759ed8e3a814147fc9ca001ce67e14446e6b84487239b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cb44dbb90d6ffc39cf3eb78ddf9c4ede
SHA1860bca1dcb07fecfd1b4171f06e4f065f5f1dc9e
SHA256ee5a9e7cf0e3a1b3de67ee2b187874542fe16d7a2abc2938bfb89c4f7764a5b6
SHA512c944dbb106c3e87ece6fedee5d91f82579b84e8f006deda76963b0aaa72beceed6d2b94a6b9af226731416a3fc3b550e8b445e3bd21f29ec2f716f45243073dc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b