Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 23:46
Static task
static1
Behavioral task
behavioral1
Sample
4d9b610f660a7d2771446917b86a6176_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4d9b610f660a7d2771446917b86a6176_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
4d9b610f660a7d2771446917b86a6176_JaffaCakes118.html
-
Size
67KB
-
MD5
4d9b610f660a7d2771446917b86a6176
-
SHA1
e5bdfbd1011b186af3021b539b5a622f0951a60a
-
SHA256
2807db9817e9257b4ab331cb61ebfba1a2d6d71b383a8fb49a9c91eb1ce48a4e
-
SHA512
d6a59dcd6a4b0c11c575b7159856f3b7f38110b6e9d3bec483b5226b6dbb3e7dda6ef31c2f25423f12c733527e47a8eea5554ca027863245207a5e4414f0a901
-
SSDEEP
768:Ji5HgcMiR3sI2PDDnX0g68FFz67O+b1rZoTyS1wCZkoTyMdtbBnfBgN8/lboi2hX:JJ3Fe7OI1ruTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0968863eba7da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a7000000000020000000000106600000001000020000000ea7d5ca72fc0b1b747c678d40c5d749012263f1ca5bf2deee154ab031dbd2ada000000000e8000000002000020000000abe95e46de2404d55cfd6a9331b28816ff635b4cf3ba81a096e7db455c30b66a20000000c9681100ff4dae887aa75019ad0ca35f9e241577f814b2505c9e5ead1f07e5d040000000a3aaf8cfc63e00ee1fdca527db8a5fa839e8988bb50e744eeed3d7f68423d79546a2091dc1de32550fffe04e3982f7a18c2b4d9dbdf3c08cb2efd0a380502abc iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{8E505701-13DE-11EF-8178-52C7B7C5B073} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422065073" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2748 2784 iexplore.exe 28 PID 2784 wrote to memory of 2748 2784 iexplore.exe 28 PID 2784 wrote to memory of 2748 2784 iexplore.exe 28 PID 2784 wrote to memory of 2748 2784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\4d9b610f660a7d2771446917b86a6176_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55558d561a9e81347e30408c0dce87d4b
SHA149646401939ec88921f8b247182fd94fb88a6a76
SHA2564455b06163a808820c90a799ced72a45c773f6c48f5d7d74ea02f4046561a409
SHA51248c62ecdefd7a48bff6ffed2e138694fbd819f8c5df7d008370f3a55137d18ef8606ac3bf74dd88e5f2eea291bc17c730475397932a90589b95633c6272f4826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504984124ae25b4c6ca9e638ee98ac7c6
SHA169ff63dd34f5ba4490fd2539d82ef93d368655f3
SHA2565767f0f58ea32e7f36d4066703fcbc2c24da6fd31222479bd90f435ab1aee5be
SHA512ebc1a76f37cca476c13583f573671c3443d95363d859d6ec1ed2a06e047ed22b3f5bdc744a706c9a2a1451c4b5da516ee030a00e241f6862a54cf99975378eca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d2918f601e9baf33cbe18d58ceb95040
SHA1a4936d63f73dbb445afc51968d3f75d98dec33de
SHA256ce17673565743993bd38ce3e56e499eb4ee8d49bb9dd4e51b5eb689744b967ae
SHA512b4e5d2568860a6654423cae6eff31cdc488534391813b216b850ed250ce23f51f5fe8a6b8badcc1ae6bd7a8eb262d20bc5e4ba36079146f7e199b0aaf6cfebb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5221183daa201a7727f214cc7341ad7c3
SHA12177cfaba651d3c97fd5bc2efc31b0709f4529ec
SHA256f40ade4a34dd72acdfb2436e542719a339c149865b1623f87bc04d90a3103f4c
SHA5129c770db071a923b3608d4626feca47c1b03540b6e7db649c35e9ab7379afd40c6f70a32238eb61759ecb5061e5f0230213a88fe816b5fdc8407cf6421cb6e991
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d7fabe2a66465c29310cb00d2779b811
SHA13ba47a759919bd749e79f69e66464fd23b62ed96
SHA256ea5564e2072a9841c656624aff56fa8ca67877d5d22fcbcbc90236216bfac08d
SHA512be9ce6635b041b3fa9bebb367f468150e9b24db0b7d1e00de999d2b9aab95253d0dae337a8934279d62b30983a453faf5d12117ca65970b8d24d5db52a5af4a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d26bb478779472ec8127d479dd478058
SHA1ca65adf8df437e8d25eadca94d3a01033d0c3a75
SHA256c4cf257644864d90d06a35ac16e80b345abbc2f9ec12c078b5bfe331a8cf477f
SHA51238a3f2af42a793ea36015a4aad268e9def3e5f2417f22b0ff336883ef1fc0922d6338f497bb8ed6e336b447d09a009f1bced93a0c81067351395482f75c39565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5549a6fb94d67024b9742a10a04950cd2
SHA1d4c72744d9b83d1d243d0aa61e821c472053b684
SHA2563bf8adfab56800afc2aea6b12e75608868271d1eebc38c14f2e11ff347354763
SHA512346f47c568887d4136072b161223836315205e96aa802a4d6ef86b119c07e81eda05388c248abedb684d7f7d654724b76d442a05d618e130c184ced2b19b6502
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51aa1ee7be7330acaeec8adc7f1331df8
SHA1416e332cc6d6b27da4934aa9fb8b900fa49c8f25
SHA256fd2cad561d4c44aa69104147cc65c1752dd46fc86445fed16269e5075bcd4741
SHA5120dad6b4565a8a1adcefb1d18c2c7d78c7f2a917b33691a86020c1d515de4c4b664cfd799b490e08a6f709e4881ef51f47ca22f5f0e4505d0218323bfbf184dfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7d5fb2742a1912159f001c27d0cb6d7
SHA181551261b7ee5da9584ef2a3d1da704323d4af4c
SHA25645519c496cbd44735d7bfaacd9c45d1105024ab09e73fd059082dc842d654eda
SHA51251d924b15124a0c110084a40a62aa193942004ca24e8ccaa90bd9b3089f4418fc0fe70b378ec309c33a388a120211669b08d150d28a3c4f1d2e167b42017d71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD565342db85495d4fd5206c4d6dd0fc9db
SHA12e9838587692b57ddcddc55a8ae61605b8e58441
SHA2568e8bf4f018ec7af7a5e2068fbad65cc9aabd42927127a7f249f8511bf263bb46
SHA512f4b336c70bece09a3b25ed427110a842656ce59a2bcfadcb0de5d6b600f62149c798cc2f0821fd85515e1a8f87c7f2e0872987e5055ccd814df70293144e8ccd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59a275ae9068f01c01d768c7b4f2371dc
SHA1e4db86f3ac4c88b645a87bcdba735d7337ceec75
SHA2565a2b8ad96057233cc8db8a52ad0a99c4b9498db85ad0c7fd1134a7f5b116f8e6
SHA5127b2443210c91017ca8284f9399bfb996227857d2fc48119a74f8ad984d1eb057d8be13a93efcfeb55ef61c4553bd70181f37727fc233851b45c8d44415e871b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b57c37811de1b738aed41461676caf6
SHA11b2ed230dd025e4205ddd8d5872d47b2b22934c1
SHA25633d557f3a6dd487f824d8a3008b4550b5414eeff7a29f5f3f4c3641b62c60052
SHA5125de95e4a8d6fad46d48d88bad871f7011d523bfda2e23eece675eb7b1fb59b6483d4cb51bff370eec601cc87fd07b7c33574b369f4c4e16df4b93c802547d837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58caeac9bee138796f8620a2acc7c1afa
SHA13585ca7d9347bd9895e9720cfe8a1e6bf8455781
SHA25684b6f0f698e16832b27eca92f236a010e515ad35cd3dc09dc26393b3425336e1
SHA5126d1685a4fb21da50e7c62e951525c7b4ad834d4be6d5dba9278b72eb5567fcd779e375c60f8d14ef95ea29f32f8cb9bae0743a5c58037222ad3d04e917c5c58d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5100936764f248134b2dacba71248830e
SHA1af8dc305466c444c4c4467194017ad6294b3be87
SHA25673bfce828a07c802aeb5c28d6a69fad59403fee114718b822edc5ebb31927f70
SHA5129947591653927d33328a5b8aac1ab17d69ffc1dfc7a3004f3930abc1d310061a54ebd8917ebc82e1e0f082eadc3c2e65b6e9f1d59174b2f16bb5b0f23227af3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c5729515d3a774d89671e4c34da8fee
SHA129fbcf301156e705a78279ca2732865afe720f28
SHA2566f4154b86e5576747024fcb3e3830915be85c2548380094ddc35890ec288c1b2
SHA512a4f663f198477c4f6a471f5dc0cd57520f5e1b0513f5a023c86c358059f7c55ec7e29fdcadaded5a176d7726d052df51a56546b9ce229a502e0dc6168a5e9d41
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a2b133e5071e825e3b9c47bb7f3a68f3
SHA138789e8197912cd21cc3fd230858684ad2e78335
SHA2566a320d8b3f31f7d856280508afe84b7deef55fa03848226bb0aeffd6fe7fbb54
SHA512421d70d8ab0bb76464876f56ca611395d8759db0cc667980574426892670804e0d53b2f6f58f8fc6f8e57cbe17a03915101f168baf33a205e76c50aea8664e0b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50799b59ed7538cbf3311142a8927bf19
SHA19e41202def1972e89d5fc250d3b11ba17f817168
SHA2565ecc298cdeeb16e816e4057282a7bce7f70278a88a5b9899cd1d248d0682339f
SHA51290cc76947d843d80c2697247ae1b3a19e8cac77a8cf6fb215bcaeebc0ae033b9416e03704578846606e3ec7ae23c1aa16290cd55a708ee17ecce5a57e4257ffe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5396ad15136b4300d2b11e922533f48f0
SHA1418e6dcf38d8589bff2414427db5d17c5e53a03d
SHA256f500aed321378a5034739a4cadc55239677233b56625fa3dd88629517bab4990
SHA512fe89c9a89745d7d96188b75d16454b4b9e81ff298902bbef390f949d95e7c200d91ad7d291bfd386e597898a90ca250159235836dc26decc46d5a4ec8f8c6275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55549f940573d46dce9faa59bd12c1802
SHA1ec580e274967ac26421fad5343b4fa413cd3293a
SHA25647dc910a5c029ee8e8804103d074c4b48bbaa1b593a9d4fcc991f4a00a01dd6d
SHA512fffcd868e2855507fcea96a395fc5ebf351923dad534ea98c0c98e51ad164c2769cfe78787ef7bcde5e3bb012af60985a0a7c363a2b9de5ddd3ebbfe9509328f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a