Analysis
-
max time kernel
120s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
2af61fd8167c542f7a1af54922363a2a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2af61fd8167c542f7a1af54922363a2a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
2af61fd8167c542f7a1af54922363a2a_JaffaCakes118.html
-
Size
90KB
-
MD5
2af61fd8167c542f7a1af54922363a2a
-
SHA1
0672da0faed4a81129655d10b9a1802c6821c1bf
-
SHA256
0efdd6e831ec941b5868f81a079aeed6a2a57786f824dfaab8f60d99b81321d2
-
SHA512
673359f19774c52f844ed5d102c0c456f36773b9df763bf5a02fc6df32dcf32802085b9e8481c00863c768f355d9d1e06ec65c4c94b291accba3c2e0ea96a8f4
-
SSDEEP
1536:CJQnvdO715r88jIu/d6ye5XbtF7NyOrs0MjTQkdTi9KFHzsKXQH8P1SCvSArXcVj:CJQvdO7rhQye5LtF7kPljcKFHtQH8PjI
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b06c438a32a2da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8A0624E1-0E25-11EF-B27B-DA219DA76A91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421435853" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000001b5e6062dbab696a24859ffdcf8fa6e95be78f7e1bf8538c0a705f6e9ac59802000000000e8000000002000020000000c134a258a85e7df33619f498505ef20ee09940bce2eea67b7d8412d93b32b73a20000000b8eed5e7d5f307e6850db6c7404bfc5b2015a3c98607ddf5caffbcc954b880c9400000008c3b874f0f1f81f9b566d2112cf9223c21f09ffb1ffcd8f627614e9dc07ce1e5e4de1bdc22e298a53f6c7014a8c10098ef8f907ea7aa478430d00d46784df377 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2072 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2072 iexplore.exe 2072 iexplore.exe 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE 2644 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2644 2072 iexplore.exe 28 PID 2072 wrote to memory of 2644 2072 iexplore.exe 28 PID 2072 wrote to memory of 2644 2072 iexplore.exe 28 PID 2072 wrote to memory of 2644 2072 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\2af61fd8167c542f7a1af54922363a2a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2072 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58af710144f116ee74119359b9c8a8edd
SHA142855c95b68267772455a54b8be18cd99734fa65
SHA256ab370887a356b58b099fed3e3571ec233e2404f1a859ae494fcdcbe4426890ba
SHA51258d78767781d586a9c83389b6e0c18b98600f38bf45493603580f158be803dc5a8387c011c49534aec6de714ecf87bf824d7884b15b08209781a172679c4011a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549ce3ee925779ffe45de2a4fdfc5710c
SHA116ccffabb1cb4d5df266f05a0c69303c76b6adb8
SHA2561ed1030cf197752d99818fbfbf2a04a3e2f0ab412a14ac4918d8ecbe97e7edb3
SHA5126445dbe345733d5ac8e96d15e51e3354585a574a44d95f91ab78f1a8ef4f00464de28016c8628f6843660acc1073c32d23be3cfee187c6c8c20e192cab9b0c24
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3758d9d58a6eb614c3f2e5fd9be9c35
SHA1b7ceefa42cec4ddd8782b02b41fc547d10d12383
SHA2568e670f87841e8199a393ecba39bfd620402687e3f22eddde8a6b03f2bf1dae55
SHA5128341bddd225ba5ec2a6792b7c582b1694a0f8fc236d64270012051f507e3a62077d602a749b64c227ff533df69d936d1fa20dc38a1124eb1f4369e1628f3e083
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5152a1142198fd05190f8b5470792e106
SHA18124b492fa9ead88b1a789a8e30230a99ba94fbd
SHA25674541c43334c2e4c673f0b101ab398553e2dc128ced5de2dc2e315d5b8da58d1
SHA512f097274a99eb1aab308963790674b12f353c53fa333777af4d9ff5cd2c2ab67be35739492bbb8398a07b9648f5006c7897f938f9fe42bb95083c19c6769bc2f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53c74df6900f6c67dd31887b1fa80ba00
SHA143e001a07ebde136d2e63b0e7742e5496fdf1485
SHA2567abc415cecf7b981c4fbe5e4e15753ec55aad75abfbea17fb16bf3fdd1683532
SHA512335f14d662d81e489b8e3e144f6dbf3e3824a83d47bdbf3b55a031961c08137780891972431c7bceab0f011c6f3adb84f582915a95150142d253f2f6cc540259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d19b14656ac7a85bb84de70884732b63
SHA16e010f706efa48c51dae62ebc1412230703a2c25
SHA256136af7f125de0a797ab2de3e59bfb6305997c01580e3a35bfd3304c5081b6f51
SHA512a60da11bee213e8267bf7d858cdad6ddf0a7d338e2b6e7f784ea34008745e953cf644675ba68d03370b63bbbb735263d6aeefa0742dc4f5e91d6f5a05194a538
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50e679a93899ac4d74d9b87e98cb0c2c7
SHA14d8a04c1a98a678abdc7f22df388eb162b154e97
SHA2568abf9db9f021b53cedaac57347aa226b4dce634e35bdd65caef2826c2e425de0
SHA512a74fa46f87f320e8c404e91af2fa9c09fa496819c847953caaff190df8e960894107214bcc46a6ad6757aba179f21a418bf939bee75c5db57a2bc564699762ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50eeae9f60cbc60294291d31a8e95023f
SHA1a45d7448f785a874112d23f47e13a0d21fb2b4f1
SHA256004c0f56cf8da0271cce59d72a74b9f6715446fe95f69b6688c572e672c6afe1
SHA51200febcd239ea1a21717d21a30423a54cfaaaf214d27969b20ed70979481c4cd4ec8545d0b5fc8ac300da0a8c009974fab1cd2f5c68ef908d59dcc2fc3815f663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b011f30c953bb8179e3472ac0a3e1396
SHA18fda63fa990db3f067c241fc20008a2b88ae680b
SHA25619d6aa9c7747a856843dc5d3075aa1037ee556a360fdf9849209d600399853ba
SHA512e1a63d839a9f8c0908d1fb624fcd984d9ad7945b3dbab932b9d78871cc96acbf135c9c37ff0f059185ea89fe036115b12837a5b218cf9afb889dacc9782ea663
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3baa7ce92b625a7997758dd73d718e2
SHA11f7a9166312d18533ccc4ff07ebb1e999a3579c8
SHA25691b4bbee13342fdea42184e6fb2e029594139ce960d3d95ec7336a1646a6859d
SHA512fb2decdbc08b8bbf3965bd3ad1868da2e4f35d55c1421813bf1e68a55fc8301d5d1fd3d593e5d7ae57b380bf585a6326a10c693c3b58764eeba17e0e9138a39c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53208e20704007c6a754231029bec1820
SHA1720520fc68d78df18c1f31a2ddae4edec2605699
SHA2568de54babb3e143ec201896a8fbda98db737e1f4212f16dcedc3055b739b61d22
SHA512c20f453b8d101af8841965edd48f03ec63732a94866d8b09d1c6c4b0b10c9548f524d957db72e8187bed1b59bff6c2d71e87c58aec05496c737dee5cbdbe71e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5017e2ca059a97e0117bda850e71a1bf2
SHA14bccbf04be1e96ba7edbeb03b2c007d59385a59f
SHA256d59c06a9af6ba4b8a037d9d654d3f94403fac16349396dbc7e0559165807b72a
SHA5124ff955b326572af5c220a386df74a3c9212499db6ae5f2e27d12e8fc1a28726bd178930c48c85b4d9721db171d12135f2a383d1b83b66ddc335492ee9e0a0f0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa2f63e0890465147908eb225d47d117
SHA15408b5e860ee097a4509ecbd5781c2acbb3c879b
SHA2566992d8cb2e173930a942ab8d17c93f44c79db8c2cc5265126d972fb552b7935c
SHA5125d48b4287f25d781fa91baf1beaf0e9fe86c8246f588f0d8b6f87fe634fe717c07fedb7d867227929e075af42dcf587e8983391b161ed5a95627a5ad8bb8312e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD528d095e12380c848de34f68305a47aa5
SHA1ea6146eed89b2106a2d437383b8fb1564547d14e
SHA256e099954e7cfb53f19721ed11a5ac40d910f28b0a27fd3159d0a9c560bf920c0c
SHA51272eb4c267095a2f5d579d65bec59d6fe2031f553ad031d8b96e5d74556fb3091d24cfdb1bd49e2c3664506253f7a099082fc3f95a18d4bef1eaa7e5642d19e2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD562ff62feacf8a1f0dfc268689a9a3f90
SHA102d4e181bd71ec6410ead2f3704c87f2ac046b58
SHA256a641c973dc46680676f96cec643f80c80dbc32362f0233717784d740704f4c2d
SHA5120cda6bff71428f6b141e48a13f960ecdb30b9899a9b43d737a8ac212f8eaacd4be5b26976fc0ba0b68378c6f63f2117a1417afe7d4f18645897a566d0705f3cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5238e841861ad46dbfddd52e855a2cfb3
SHA111b7bf9db8a86905998e8004d07c4b7af11475c1
SHA256d2e4d860a006f7fe9824ece5670c3c876c1933100ac16b34632e508ab87ad435
SHA512128b4f5c9ad9e7a48383053c81e5db546ee3e57f771ec7b506968ad27e8817dfc72f6d383705a5e3715374f96ea870921f3859def3bee38e371f36d4ec901188
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57d07740f78cffd209080291dd4bfce3e
SHA146cecbc65ee95f3f30cc23bbb26490adb9ae93ce
SHA256d0edf337b1cc293a5295caaf51a28a39a0934a686a4e2b7d784d3dfa08c88613
SHA512219d92bcd7ce24d2ff7b49849828f0516a5c216b6dd201005624c7204c810efbcc8cc1994595bb301ff02982c7aca709f9a0f06b1e1d61883f3d79e331eb694b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba95316781613aa7b2c7ad8283155e2d
SHA15889b5a6549d60893491c2a24ea649791907c9c6
SHA256ff1d9f749702113ed51234fc646330b88961d8577a14bdcad78bf7f65f5f0342
SHA5123ab102e962bbb99ab55e464b1ada6fe4806e08fe018bdcdf7ee65b375e320a9efb119ac998a8682ea43f4a31cd419879c9897a6720e1c0fa89a1347eb5498e12
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IW68H88T\watch[2].js
Filesize161KB
MD58a29a6ce270ddadeefb038520bacd405
SHA169a42c5b19ef180b6e9ac64b8b423a0e0cbfc191
SHA256f8fd9fb32f8039313b052bcf1769ddd4de39aa5d311635111bf7a5cb9df7cc3d
SHA51268fba294ef57638780de7e5f1b6635fc0e3da75ffd32cf859933a78577ee3aeed2fb432c74769c2f501b117f2744211fd631a6116a2749b7fb33e9db2aa18914
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a