Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 07:25
Static task
static1
Behavioral task
behavioral1
Sample
40ac69572a171a1d3eb56b3c2b7ca9bb_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
40ac69572a171a1d3eb56b3c2b7ca9bb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
40ac69572a171a1d3eb56b3c2b7ca9bb_JaffaCakes118.html
-
Size
68KB
-
MD5
40ac69572a171a1d3eb56b3c2b7ca9bb
-
SHA1
37ac934cdbd6a733a19b99916d8bfe77e678ad51
-
SHA256
49a7078c5ecb97622fe4c4daaa9f519d551f91912227033774606a98c5dde857
-
SHA512
93be7eebcc643d14bd85d100909c5541ab1f52497dd55e993d959c2836e063d49696e392f868ce034d796229300f45a77d78b3e80028eecccf559ea80904e339
-
SSDEEP
768:JiOgcMiR3sI2PDDnX0g6U8yLWA//AoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFf:J+66WA//dTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000112dd71d930ff24b8b2b71a2c228122b00000000020000000000106600000001000020000000b01587d6fcd47289dde6e080a18e0bbe1e9de0e418a71e829c4e9c754dd94b5d000000000e800000000200002000000098e16a6df66c7913d8d39379693a4e8ca35e7381ba5d7770f579653aba071e4620000000c80ad106a3283a368ab1fd12a54db82f87ba4bc5156c5f7274129bdcce3049a240000000f61aea45f26dc4aeb118abe54d85bb3e32f4aecdd67cff8d7f04ea8c45f330128a1f5b1085a30e3f7452e7103e2031048fa80c1bb73145f48eae3a321ceea416 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421833390" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1F257C61-11C3-11EF-AC06-EEF45767FDFF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 105c98f4cfa5da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2240 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2240 iexplore.exe 2240 iexplore.exe 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE 2800 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2800 2240 iexplore.exe 28 PID 2240 wrote to memory of 2800 2240 iexplore.exe 28 PID 2240 wrote to memory of 2800 2240 iexplore.exe 28 PID 2240 wrote to memory of 2800 2240 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\40ac69572a171a1d3eb56b3c2b7ca9bb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2240 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2800
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5203e613c8d87aaa251140f8c159006e8
SHA1e99a9e92b50bc97de6cbe46822ccfa4214c17a0f
SHA256c99ae7404ca7be919f65cd9d3392e8c6ce77f24c12eae8dc5edcdd573153e531
SHA512ced1b161d01ee61ab19fb933b5ac81d9a5d39907e9a44c926b1bf415ba37631012d5ba2125745a37884806772b3b75633cc1561f60859f8ff1c932d57aa0b81e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564459cf384ca340677a062037b6a5cd8
SHA1a52f6620b7780e3c7b1972631d75974ff08564f2
SHA256c2a01ecd8a47a160e4ae97e75cb5f4f4a0025a2fd87d0a95c23ec0bab4c9afdf
SHA512c6aed43e10b95af8a5275dbf80fdcb0fe6256ba76c10f2f172d963ae051cb2323be64d9e6ed333fc9e0170ce7ff20fcb55a0dd93ce04281a434d4fb58e18e4f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55a070dd0e84b45b26ee576fbab69a256
SHA16266f2de90f370905f83bd1be9bf0c6f3077404d
SHA2562d0a1d6aee97c8139e4db6a3cc5dc7addb409fb00f0cc985dc4d08cd4d8b0b5a
SHA512ea0b0211e67b4627817a1d76b3fc0bcb899d99b0e0405b93667fdbfc7fc80f06c111e344cb5220d61add25610dfa0a09515f2f57a125217c6804a9dffb3e2435
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54fe65242f2d91b5f6f2c549c480ed539
SHA154d0238063a15e104bf3165c68e90c80abfbf0aa
SHA25654eb2c1face58064518f5f2208b685062a0b021bf271495e9362e0a08f933fcf
SHA512a15b3e162c3700a93c63cbe723cdceb7d749443c954428445591147a985bcd123ed837263a98da0de1761016da634f6efe35beffdf1608d58c24966014680120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fa2b4220c6c0af164cfdbf32fbfc83a2
SHA106bc71c84a485869e21160d3ff46e0240be8ad41
SHA256c86c99caa4adaad09134960a56f48e3d0814fbae979ae3a8119dbdb4a6e49d89
SHA51224ab993bc4b0fed1f3c8b46884b4f73d8954c0b5bdc61a20b9575a3ab1c5520482013e0a29f27541217fcb6b69f56870f4bfbb9a01ba1a99a608d2bcc3b4ab6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f477fb33e9606aadc9fbac6466699a2
SHA1d8951f70a53e3a2f2052454069c1bedea9d32169
SHA256bc67ef00300586b62dab90f2f5439239d50494dd24df26342f2e411b850e1a69
SHA512032bb5d1682de2e5b3abbe467907757295e23f53ae0ecb108ac379cd460f4cbcc5f444722c8bb36434d35e1d0e59f4b10d6da573841f080fa76ee5d1173ba914
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54aa8d040043f47c730fcca198333c000
SHA11db900c3e3e4a2c0f10b8c70308f4341704d079c
SHA2560646bed8dbf675b71ab2a403121147c11976f2d91654cece344e354ee92c09c0
SHA512c3a2f8cd3fd596a6aa3ec6f7a9620ba9259c6e33ae607c4028c4127dfa4afa9e9320d1c1ac9311abf6829a8c5f756a0b03496567255a26eeff649ca4cb9ca41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ba1506c3320f22472f1305411b4b9fd7
SHA1d09dc0bba16bb05f733a1954feb04758871a789c
SHA25646b68c26438261e33280a078df4d6e7e1dfb43d00af8c0e4397a709707a18229
SHA512bb805ad9ed56657b58122720c92c9e3312f9da6e329d7b3ae547d9c1163fed6f5a9c135d13bc3ac3ebd763fc5d0432c0757f9bacb32f8d502295465938538487
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5243864ac98cc0c0d92540548b46d1cf0
SHA1bf6ac6973218552d98f48265397bd16d565ba9e6
SHA256b5669257db46a30b6e94aa1b02e1fb0842208101ffa9da95e95c4055e74d0ac6
SHA512884bba926d9bccd41fa1f94766704757f2280f7296a1f1d5d34f07f3cefdb27f7263757e9c4651b5cd83a127212ef7935085417806f08fe7ffa49fb57e372f0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56863b57f7cdc4429b28a5d7d91c85d64
SHA1dc8c8407fed4c3ed2625e1c77e07b0f97119f8a0
SHA2563f630fa34e0eb8f48dcab981e4ed46d7502db9455d0fdbb9ce89062a002f2468
SHA512b7c4bf2c8c17a236c03afa509115b7b84846685991910c11441abf6085e6b769d9ea24d59d0443e86c4f246df3c5119c66ba63864bb69f52d43e704a41df2abd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a6578d228e911a18feb77b1ff0aaf0f8
SHA1c393269f02994adb28b8821afbc149716f3e9560
SHA25610a9eebc913305bd5906aa417d49424795ef4923acda55fdbde40978c9455962
SHA5124994a5f4859d2d8674d69eab444c79d40ffe629ee694aae36a92894faad69326697f1df4cf46ef4ed2ac893b555ccb2909d3673de22d17a16d8db8b597269de5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f742cb27fbae3f7993642ac1c9c52db0
SHA14f60b24df3d51ec2a381e7ce4ac349a03487bfdf
SHA25687e0f8b2a212df2fa750d27c195b0ba4a3d0173dc7871d1a6d4951bc845c696c
SHA512d7742bc839ab77e6e010a2e7d91a6e9548d3b0ea8c7e8e2956f2a070421ca407880f51778effbd56b6aa34f6fd825627dc0b89f98481bf3d91b28e4053a604a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eaeee3fe316422b6b8a717ac0326cee0
SHA11112f4f4393c21511d15b3ad143029997351e9a8
SHA256bf77d77b600c485c03d29c4cd0499d0ebe30cf8f4ed181dce4be6fd77c07214e
SHA5126d1a9e14b7541071e58e3bfc9649b5a90aae74e52e8ad612d8aba311775e9df90821ade73d3cbd98955815bfd7f4359096b849fb1e7187154c466ed49fd94842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e168d41c39c1e8b7b26f298f0e920105
SHA12878f60f85d114e83932afc8f5dd18a724765540
SHA256b799dc8452ac129ba5ced9394334d0c959f95f46abb9f331ea62bdb9aa5afc97
SHA5126363ed7e5117fbf14ce189469cfa7806ab3e575c24c4f4eedc73327f9604f2549194daad170f7b095f403f994407105203468940689d66f68f058faf9b3a1d6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cab3e430d8fc53f01cd5c9abe01043dd
SHA1476c097fc78ddd862ad1b04c0c64b29b187b8a22
SHA2563bb071ecb1f9c59d037a98391fa096fe268866d3ab243a7b97d5c891161fd8bd
SHA5125410c7016d7e602feee526d9feeb22c789ed14f59a963ddd6c781e8db4a6709e68c7080ca429196420266e968d468bf6e42c61d46f8b924cd60d2c7cac42b98c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0be35fb3ee48ac66f32c99eae4c07ac
SHA12f32728d69d716b8664687d5f46321e8b406860b
SHA2565d9e7ae0e3dac9d5ddb05b5d6c676c3eefef98077175f98ffc300bb1b33d7777
SHA512590d75f2dad4c564589fad5d21fcc28d4921af9e9fcf36e27778588bc50053d427cbded1e60be051e0e2470bf8041b80899cf6c9555cebdd25e3384aee56dedb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54c596ff13f43a57fc263f337391e98ec
SHA193b4cb6f98dbec1c8b20ddb755ab59a1c0adaff3
SHA2564a639061af3c426a9eb970eb0192c347586c73157d6a10d1b229ff4df40535f2
SHA51249963cbd1d55019dc13fc38b57f59888ba33640d53de8ee2b99512b32d7fc49d15732eec6cf2e899615a2c359de53168e01ef589e50c756eb29df7a0195f7565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d4b6a4b42b5459ca761ade5577e5de1f
SHA1378471c8a660a5757ac549cda6e306412137bd1a
SHA2569fe4a5744ddab6fdd110a4aad938dc03d5895db69604b7384ea812e1eeec64a7
SHA512ea9202dcb3a7e6d162ca234ebce20a23b875cdd3b61288e02158bab7121e24e0d128d359ab7a233d9c5c4da0e35b4f000e3adf582348073c05a752d71e8d32a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c76ed7b068e59f6d425c47d203e967b2
SHA134a621a80242858c1319681b79ec91ff5836b09b
SHA256f7ba4e38ec01d19f5a9677bd64605ffcb888f14b068a56cf82b083a25bdbeb48
SHA512bf5f44505290c7dda87de010455a55fe746b97f169c7f4ea6de0a3739946ffa5b0b652fc1c016347ca03f1f21a14a54eb62ccf7c855d32b84c32c7b5903fe6be
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a