Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
5ed480b526e0a4c187a3c7a96d0da480_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5ed480b526e0a4c187a3c7a96d0da480_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5ed480b526e0a4c187a3c7a96d0da480_JaffaCakes118.html
-
Size
58KB
-
MD5
5ed480b526e0a4c187a3c7a96d0da480
-
SHA1
5ffed3ae310aba24bdc7d7f55e42c15ac3a00f95
-
SHA256
1b968cf03af84fff2afb674768926e9a4ed7fbbc130b0eaaa53111503312be55
-
SHA512
6afa587ddea6d5bbd1a0c5c9b3c393ca1dd13044352ac12a3ac669738194afc473ae18c88e8071dd7d8dfd8d0e7ad9768cd7ff067f9d9ec7c561c465ed865731
-
SSDEEP
1536:gQZBCCOde0IxCgpQNfwfVfffjf9fPfFfeflf8fRfqfOfCfTfUf6fwfDfNf3fnfNM:gk280IxMItnbF3N2dkZSWaLMyI7Vv/VM
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427607369" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 400df19353dada01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B78E0641-4646-11EF-8EE0-F67F0CB12BFA} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000d854e951ecdca4792ad3aea80f035510000000002000000000010660000000100002000000058ef775c2440ae7ec5ba3184de39a9ee9b18d01483dd687233fbca63faec6273000000000e8000000002000020000000ba071d23c86f8a3c1c9f10ff0806237931cbc806b1ec8bf0a6f8614852f5160e20000000a1057808c3f4e34e1a0944e87c41b2f88a6dc7ec0a74021ebd89b5bab07df07b4000000024b9a889208ef4f8fa99796d506674e542f476b072768b4406a819dff5b4716c52f133256fbd2d478490603c8368d069718a627a6c1652dc2ac4c7777b66687a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2568 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2568 iexplore.exe 2568 iexplore.exe 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE 1612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2568 wrote to memory of 1612 2568 iexplore.exe 30 PID 2568 wrote to memory of 1612 2568 iexplore.exe 30 PID 2568 wrote to memory of 1612 2568 iexplore.exe 30 PID 2568 wrote to memory of 1612 2568 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5ed480b526e0a4c187a3c7a96d0da480_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD585edc03b7a246c821d6f6338d17de87a
SHA10a4f5ff7759efaa43ab181a5daba4607540336aa
SHA256c381cdee423ab4a257eeda2a3d1685d36e95a0a7392b949ada694fc31ad77c34
SHA512023efcc75a6e59757698610b1b4825edda03319bea5441112658f371afd09bdde5dd929bd546ee34d5e04f080319db38103d673d18fb8400232742b479e1a645
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7c876750043ba497c7b4a766b0738ac
SHA1f38f194ed91ebf13b846df4c8f6b7959e5a67e76
SHA25660c9358123d7aba70c14742ff04a69642c593350ba67446de687afff9352e481
SHA512af7f42a594935df524fe172a440de790a62e2e54d757aeb89863846bc42f346d9922a3dd0fa1e86643afce3057c72dcc4408a2b17bfd2a1eadfd36f909d75bff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD564b97feabc92af6e53d489463aee22a0
SHA110a9a112b866328dccde8bf710e4dec34cc9b960
SHA256bf9897f29f69fd8e133be420f30539b9466c135bde48347d4d6d7aeb9bd34f01
SHA512282236f907a3ae0c2a2d82e849a47bba0ad94874796071012a504fee45d1f6b545c540289e0cbe2a4bc26fa5c35f768ae1772c84009f329506fbd3dad0799736
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5200c3bd9ea5d58a0e8d0ed49665548d2
SHA1f36c46d1bac56f70810305f3192e0768efe224b2
SHA2561772eec25327db8249ed4a73153c7ad698d1d904dd092e2624f895827bc6b1dd
SHA512b8a6e40f4ab7dfaa66fb30f8814b3f4f5b8e4576d133fcd92ba477f05d7826bd154ee9f8cd6dffef232df19288284d0d6f7121c7d5c491236b60066fbc98fdd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56372307bd258865e92ba578336a4f702
SHA101860474a57cfe0b62dfb87dd14dc5a52b58a3af
SHA2569a5fa8c61abd343bd5d83c063498f81234bb3b119bf81ef4e4a0a1289e021583
SHA51254eb79262566f1a002b03e64853158bdd527d2d72d462c79ce3de57f0e96ff22230a31ffe13dec5faee6e15e2d62dc28ad3e4c2b8e065ca368e2f188a05f8524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b56e1e7ce18fc901300b4931f2cbb358
SHA1d038074e0dcd5607b86a65da22d138c08e9e047b
SHA256d212e6665dfc61b1120761c80b997809126d14d9027f0686466add46bc9a9967
SHA51234719eed54060e974e79bc8d08664a80b2ff60b40c26538474d43f3a49bcd593e1996713bea7b21cfde38a7040c412fc8342aa618d6aceba66aa64765f6723d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df880627016724b03ebdf47b29b2d3a2
SHA1130a6582042a9036ab52255a72ab312ed40253fa
SHA256aba033051a119097d4a883da378c9e5e7751af3876b1be715170b1019c1f6759
SHA512ea771ce6d80b181a6979d3efb237b41f12f8c4914e5ba172f738e5f2ddf917f4ff61d56511c3e2d84d6d3e93665bfa50ebbac3bb3699c068ab3cf6c5a0d9dd91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51885073cffb6a17397ab204947692ea1
SHA1c5f44b5b93a11c968f090685fef3d75fa7584553
SHA256981061e5d8e7e2394c4c7fddc58b777ba4dc6c153d01808dfe4316c6899fb623
SHA51253a7a5c4e0f4719a9b2ee00749d37c158edfeea8d60db3ebfbc3b7d9046340eb662493bf4bb1ddfcfad09564c8e09d3af10888730556dfbe79c93158fd12baf2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82beaee07f971083ab366eceddcf88f
SHA166cdf7a50ab6b6c1d2ebe324d6d2bfa881e20c09
SHA25656ca2760b9001e19e779a7af13f6d80f17f429e62e3d7a8774128827347d2184
SHA51251ecf3221a836863dade62d2bbe983d4b57088f5545dec680ea7caab3acced7b5d5d36182df6dfbda377e8384b59fea99b013a8c24b48d6a0d8cd82e90d0f01e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59a984e891b929756faed53a7bf605bf1
SHA13d8d6e62576ee7d8ea5be4a0a134a65fc10e1a43
SHA256c5dd1fa0121744141cca4e3fffdcdd9d50304d4932a7075c38d0d0fab5b2d58a
SHA512d6f8d46894b0ff738593b5f5e4756b9bb9c06e7b4fd80fdf89d7a4cf28c8167bc476e2cee56a103f0a3e93fbefd510c72222d70dc992a30e23d96e0f68ed1582
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad5a5621484c47f130ce0f99d8a43c92
SHA109c76f6f95ec09884cf842c008c885ef1608d762
SHA256ce53a0bf4f02aeceec1e910b8d3ba01075fa0ad65cf7febc50b4ed74c13cd662
SHA5122c3554f450f6baa07f7e62b6a06611eec9f25e7fa39d412376b647cb7da614f9cba6c7af1d010659a659a6495b253b3d42fccca44a9e63805bfcb150d415ff47
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b