Analysis
-
max time kernel
134s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
40806c978146d2866fcde107ecaabada_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
40806c978146d2866fcde107ecaabada_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40806c978146d2866fcde107ecaabada_JaffaCakes118.html
-
Size
4KB
-
MD5
40806c978146d2866fcde107ecaabada
-
SHA1
e0daef7688f485a0c65af1bd061b0f2fb393e786
-
SHA256
e372c8167322c725e3be337ce5ccb95c8364481e5c99d945388f9ad025d15e26
-
SHA512
9e13f1c20c255c162320e82a4e012a0a2fa3273893aaf6e72318ac4e06d529b5fe240f2c51d204d4e608f23d06e82c7e9f9733c8fff7b5d042cffc6851940e10
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oOPd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDt
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421829556" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e93610000000002000000000010660000000100002000000029978815b1cb759ab9379353db430c4223a97558ea1de4d7d9ee5289dc0e3809000000000e800000000200002000000087956cd752e44726e3c8cd07acd866e07ddb2ce2a5212ef45c4d97dc624f738420000000529ff4ffa3faf4d6e944dd538b128c0899e115319e213d17e68be4c72e707cc8400000002bafddb718fe080beaf95658a5cb084c40782c1f4380ef748bf32a07f61188127a33d17b3c88090d510ca7bc15959f560ec49660d0f62abb8cc4e566a3f5add6 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 000e3807c7a5da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{32A95C61-11BA-11EF-A7A3-7A58A1FDD547} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1488 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1488 iexplore.exe 1488 iexplore.exe 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE 2068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2068 1488 iexplore.exe 28 PID 1488 wrote to memory of 2068 1488 iexplore.exe 28 PID 1488 wrote to memory of 2068 1488 iexplore.exe 28 PID 1488 wrote to memory of 2068 1488 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40806c978146d2866fcde107ecaabada_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1488 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a6453eb06f6d21002a62d18c7c2c3d7
SHA134f5fb0bafb1a075fec0aa6bfd1c73f431272f43
SHA256913f772523269ab4eb4c1337b90b49c55be6f44318254c3981a345ba0b70bd5e
SHA512110100673c40d6e9943bd0645e00197a72b8fe3b8ce95a3d6f7c7ae18e7b1ef1a81b9ec01eaa82582452e468e8d7715a9005f6a4be68b0eb230fb4dfad35d0b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56cd93b8da7bd6afa9d3811abc2cf7f1c
SHA173efe80e366059ffd6d3e55d0655170a0450825b
SHA256cd5e095cd7343f0e72ea7bdc075b24a250701981c77030c6fbbd671dcfd47884
SHA5129fee06474444f6eaf818dc0292b8ca14001c2d4c41ca8399acd7f8e20fa7f9fc21516d730136ae02b5021a2d4a7d09e196b0caef4e9353a1a4aba04a372c97b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a381886b2f651b27682ea61b6bfb3ab1
SHA1287f31f4badd2423abccec629885d6eb0458e6a4
SHA2569e909acf8431b1a07ce37894c5c9ce983cf168a06802454fa9f969193ffc14fe
SHA512d7068d10e43687dab11eb56759196f331a1de2008a47e89ca2f4c9fc7887a11a976ff9b80e3427ffdb90841a76fb15aeb7efd6cc86f7223d6b5be6e8163cab23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50c25357cd4a79af8fa498274dd54896e
SHA18c54002d144b2b3be625d8628c60854b52882acc
SHA2568bb3e226a28e17a806c7f9f3d0823261f8735a46173159d4027663d640491a1d
SHA5121a40f4d9df110b135c810d572f51c7bda187de8f094275deb3eff393f9b1fb4c35de8b3bcf139698cebcb6e116d733dcfdc8a2469cc6693b289b2f4c69d5e93b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595c026f39c3bb88deb5cf1864e371950
SHA10c0300a8bb1d60cc6a193021e0786228470d5b5d
SHA25626d3f1cd6d09cb9e1118989b49eae2fc862dbb2ed0c0bae6ae42eb4b8e432c3a
SHA512d416fde764792250dd9588ee8026d4d7073f9de0b36fa0af59909f9669a0d3a1dffef5bc34d32966d874599cbb90a3953e3d528d77a57346731c1b3263cd5f25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595a717ccb7c998fbc3b4366bad703804
SHA18b9222de7d7987638af0c9993c6ece4061611da6
SHA25674973c0b9b157fc74d12f7f583e5423dfd9bfee170777a1c25523c9c1eadfdea
SHA5126ccf45a819e8d1b3930d0967ffa42902dae50ff7c17f0547e0df3a534c346d863116ba249e0f8df7ae3423eadf71b1c1ae9ed846e5c122d52430eb185f764c3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54573572e752a3675e192887161c92251
SHA176ece16a6d6e7e537a90cb15bbace06929498049
SHA256c676a580d8a88ac4fdc50c255532e653a480aca445af1d8a0df313320b72bdf8
SHA5120741ce56cdb3eb661872ca30c0a8718fda0fc6c3a547cda3c025d113a1413523d856e66cd7481e7d22e9cd4e02357c2503a59548cbb7d4ed86be27aed7460a79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54a406fc0639d861d4ccd77b92616ca1c
SHA16abd1cfe7395c22c67fba1ff999465ee5e4df6f5
SHA256f7328bf55086461cd80ac97a8543309308b20deff94401a5fca3f9376d737938
SHA51238c0d0b11d294a45ff293dfa8e3479be0a7d4ebe4da3a7d83c29c8842819722cf6bee3a86a62abc3425e7661454926c3ec8c582444c7bd87d3ec1ab2faaadce0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD543478dda67da25001bfe9dce3d55bed5
SHA1c46c83b3104d5a34ea2f2d008ba579f03be8bf55
SHA25697c2dd837db506055e65e6a4de4f4bdc5d67cbd64ce437df430df1eed86b7bbe
SHA51209f4fa4bc0113d79093da7cadac2596feadcebe946e7cb12d57a404bbade1eac2546868cdca88352e4fe9a4db2c132462fd5499c4f1f96228fe5ae8a10b0f9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51565dfb30f0e4adc2bf69783f7a4aad0
SHA1cb958ac0bcaf6b03778d6d3bd2f126cf3ad063a8
SHA256df2ec1c0071e173693ea567c7ccd8312a30a02ab9df4982003a3e19d0ee097f0
SHA512ed5a47b7e6879ec868c085283bbab12c9a88f41de46c8af045f656a057142d20556f81120a9c81c8c06637bb344a491cacf131971b54428910363ecfcf9dd376
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dfd79307f6867ca88dd8ab07234e2a8f
SHA14880469ed98cff3956abdc434e5e09de88b13714
SHA256ce333a970117dd12e38044963bfe364d39a612f63f9cbc8e58decd7c492a2158
SHA5121e9a284e77204559d5c06bbd455db2ad821ac297c8514f9d8075e1d6abd4eabc6f07dedfe0a2b3327b0901f61752bc1b478a78f6737fcf397a6a2a579c8f459f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54eba64a08c63484b6de2726cbc99a7e5
SHA133c164019654f785eba1306ef016165e47ed7766
SHA256657a4eee58cf3c5626bff87f594644f1ad06c44d96d49f6109bd06e8c11eff88
SHA512b001243c41b5a6a5ec5fc0f24e508e9cd3ae1dcc9a261ccde3da86b62a032a5f098035af25633c450938aed8ded2ac5a392c6f69199c8b54efdfe2b47e863a44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b8e09403aa3e41722affe31cd5c3d6e
SHA12abbca5eee3657770582a77a8392b6c889e33791
SHA256e6322cc9a62f6a3ca4e2db612982be92dcdcc96433a38690e0353467c4a66235
SHA512870d988b151e96b90c4dac0236fde2cacc49495a45227baf41a233ce51beb1d3c0e85db55d6b6c66252c406463f3454f523a116b2834a50a026095f8a9564bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD553eb4423f89c46e6fdefc712c8b88a4f
SHA133b9dc5637043c022e3078420902fa9ae079164f
SHA256d56971c2cdc378273312bc94fbf974de331966e501d82f42bc3719957eb9d540
SHA512de3bc460cd9809bd3ed34b25ea345e8022e2d1aaf633c3bf174dfa1e27923dcd5a28f7af02eae7cee893dc67a792d23feaedbf1cc0b0cc02560d26794a3fcd06
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59722321e024006858bd96949768f6227
SHA1a3a49ace54dc5f3e0242c2b5cfb96488b775354a
SHA256007ca688573275a6dac67f1bff6f11bad0533119d8dbf9b03077cd349921cf6e
SHA51230160f5c078f1cb84db7964bebb87f5cfcb8777e03bce618b9bc08a4dcbd35cb12ad8cdfdf6232eced67cac23067c35ac10366e0ee41532170f83035eb9c70e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5435aca3bfd4832e64673429e68b61bbf
SHA1fd00723b7d45358fc6a449d0b5ffc176e1cc41fd
SHA2564fcea54392bb73d1fbf59ecd2c2dac77d60738138451cdc0b216b79bf4bb4479
SHA5126eeac633eaf9a7d25fad2227295e33f69efa2532f13c96122db72a0ffcab8f1d1d8ab4c7a51c5bcc4f0db743052e1c60fb9ebfb14f391af72bff5ca128684c2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca5c614c54ab16a5b3d933b94ac10405
SHA1512aed354edc46eb98b7270af9d5237c7f4adcb4
SHA256f2fb2a76159e50077d352c0fd808c17589ff2d0fd51c69d56f091ffbc6598693
SHA51263424f773cff83ef2e76a45249eb0331dbd3f8709b3a86cc63afafd8cb10bb02e157e6b579d43bd43d9cb2c4348f9806f35a71a23d77e936a7043a2530632f9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0c5fb1446362f8ec647ae25d1c7d647
SHA1091902b3c8b5d9daf40ec8bf8a704d226a9a0d52
SHA256a8670d2bafb5e201502555894e57a6e187604ba51a4d0d0e7958f166b26808e8
SHA512f52da9cb5077aa777eb5ecee92f1f2c943d112967fc83071cb3686d3c3b14ec40592940f25008e171f95cc612028f03de489b43d355debc0e8ccc60cadc42ed6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581bdb7219217c91991001ad89ee0211c
SHA13f1be25c4f1a58f509ca07c27fc994061a7445f9
SHA256c3991802cad6d893ad336d8f97568fb63713fe98f2f687bfe1bca56b4d21fd03
SHA51281198d4f81cae05a9f1471b9037ef76c7693c8ae561293ee212e3f1316e4cf140ddb32dda39fd7f3b7a3f1ba545aed066f856eeddf8d0ae70c74bf019b2b652e
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a