Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
509cad20da46c1eb92a04ceecb3e7c80_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
509cad20da46c1eb92a04ceecb3e7c80_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
509cad20da46c1eb92a04ceecb3e7c80_JaffaCakes118.html
-
Size
24KB
-
MD5
509cad20da46c1eb92a04ceecb3e7c80
-
SHA1
1c752e7a3e7787c40175ab21fec7f0311625e047
-
SHA256
b2af65b3a02a1707ef841df1ccee4a2c337061d938a1eec52f27683b113ff981
-
SHA512
83618f99179cac81f9108946c137cf02a1ac330a0db8806044b8f9bd20c5ce3ef11a5816ce819e0a3e073fe4cf4c0e3ff5d024e10fb0643177ad713abf673b41
-
SSDEEP
384:rDL2uKua8/5eGQ4bcB1FWJJ9CMwMcXrMlazzOqkeYhqa+zzooWsIJ72r7/StzWMh:rDL2uKB4bcB1a1cXrMeyMcT2vx8X
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000000f8ac6ada7badf2e4198d07eb949f783230633d2b63cf62dc6d327ddfb3fab62000000000e8000000002000020000000e2bc626351e524144e7b76c85378db78bf80d89c2d8e8b0a7ede6566a5de551a200000006419069ed0c2bf6862ed243ffbf6e211cd15f1c8b431acc897ae56b6afd6335340000000f3dd7356acfa1350db1b93ae19897413d57b71523d4a4a32cf21bb8762e91d20447352ebf1233eed9175d16f384e0d53987b86538e8005f3a027bf63d97611d3 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01F9BCD1-1472-11EF-BB1B-4658C477BD5D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422128404" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 509f2df37ea8da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1728 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1728 iexplore.exe 1728 iexplore.exe 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE 2524 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2524 1728 iexplore.exe 28 PID 1728 wrote to memory of 2524 1728 iexplore.exe 28 PID 1728 wrote to memory of 2524 1728 iexplore.exe 28 PID 1728 wrote to memory of 2524 1728 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\509cad20da46c1eb92a04ceecb3e7c80_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1728 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59c4925d176669c14773d45007036e3da
SHA16c296db707458001f379b631ee361a731dcabc8e
SHA2567bcdf4a6e84e9e850d7d46b06699841a2589b0f320ddd8d53d677be417038dca
SHA512453e582193694726d2955b244410e5d87acc8ea0905492b25e3498ebdf42779dff74d4a018723b0686cb4147d510cca2fcf64ed89aa629aad4bc01b28225fc2b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD521f8aec4259e7959be01548495d4f6ce
SHA1abcb62650896f62b378cedf24274d3ed480987ab
SHA25621ccdebc4061494226abec8e7abb9754844b0056171ced3e817917280c43f7d2
SHA51206cece2ab8f60501f233623dd4acfe01fe94c05d86c0864d9346dd608f27401438115794465f528d371f518593ddde0046b7deb81496d18ea1c0ab525fa35132
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bab05134615fb7d906693543c298f548
SHA15f0082e40db20cd9208f6d5b1d2ffb1aec9217a0
SHA256b3ab1527cef98ed9c8e907752aedc20a7c30cb8ddd1285c5e1061abe8110a598
SHA5128f12bf5bd7f95e060ee64212699f7d9e30a043b46e125d61074d6b2306d1a2dc17b48a9cb586ec8b6581c64ed63ee23e5acee603a5cd87231c75e8a6540c0a10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e79f7c8243a96bc643598df2274bb9dd
SHA17260b77e1d85da23c63cd55168e272035838c56b
SHA256825adbd0e7669269da0b18ca0942a8e4e2cf8932c16962effe1449c1bc1b1526
SHA512d8ca3bb7e4ac1b3e93692229807ea9387e370877eb00956475fe8e414c7b5cab90389179be85e67678d805c404c76e2d09ca7f370baf2d08152e5f950f528028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d01675c7e900392dc8602992c2f04ea
SHA10841371fd35aa771144a7943dc341ed130c15f80
SHA256c4e6ceb65c6a148ee198c950a69ca870f195b071630d7a04b5b1a5f337f703f2
SHA5127416abcd83af38f5ed59a8d1b09ac3bc7173299d2a6d4a429a54adbf8a549cb70308da17e1fcb46f39b0d91ff74df8b00323d823cc6426478be04c619c742b43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cde10991240a55a5f538e8e20d31f035
SHA1700c3ed905a64310c69a95e42bf522864878ef82
SHA256287f2f2f4a7b08e760e338eeee10044195b013a49418d9366aa40cb33c13d68e
SHA51297b8ac1ed53c57007f8abcbf42c56a0aee520a4371ccb794ac25e53dc3900e1eb4dc807120bb1645b6ba5af651e6201eb5524a6bf5291287f04d85ce8c56e666
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be9e9a5bb48989d2af224c4b10ba263b
SHA17c27ae599515b73f03dc6f49e7437f1bfa0e2edd
SHA256036c6bd5d2e8ed493d2edf9115c05ee4aebb145ab2b71f9efdf07d28046755dd
SHA51283a4b416fcb7f67b236f2743c5518d8ae72867ff01a34c9f0863eaef5c6fd458c10e8873809ca215bc03c68e8e0744af239d2646c3c3e2233b7d7b6c70f1ef02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f309756ff2cd4baf8b559eee9d8198df
SHA13d26196ee205ee2cff2753f82c989afe54baf055
SHA256205643abce5dec0f45a6d474b0fc6909a36612ab5df95593add576fe0db444f6
SHA51202a022e21e7c405acf8b16bde6c1104e1165cce2bbb5e0690f216976ab261b2d2ed59fc0566b89900243a4b6500014a4b4c7d1f3adac56beece510919ee9c4cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597efbbc6f5666e182ba4fa08e0cf256a
SHA16c894921e488d623814041d912438831b664b06b
SHA256e5f8ba188170ebac5b0b84f598ff93be95479f0c0301449848b41329f3834216
SHA512d31ee7c729808d99d29cf027bd1a9403431f4d60f7a49adc08b4f51364a8d3b227adcae170147b89f674da95fef03b725a5babc45968f80d7ebe002d5c50403d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ebfc1c526965481e2c6e5c9b46eaba62
SHA163d679db3725d8b19b0ae4c1130fc7336858f0a8
SHA256b620bace394c537b472a0cd3f7fd82d08c8621fc5f9611f6698f33b5f9fda1ad
SHA512dbfdd2346f8ca5772f3f25d29a04a8a91a892eb0d8ff05ebbf1a9db9e3f739641b951fa2667b105ea03b796644d26f98f00328d8f19b5358b1d3b94fe6b887f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be35862db8b596eb0484043dd8524f17
SHA1f5bc083fc61dbddae15f40d3b030b1f1e1e236dc
SHA256600681024523ea6e1999118b9b463190261ff26f2697f1d015ccfbdce0847a9e
SHA512973d67010aed26fcec36f0b883393b62ab60b7d4e876eb425b340680e0211eed3a32722260079c45e9248eccdde03213c25d94c0622bed5e2933e34c11a6a63a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD594df2cea45c3d271635fa451c8548bb3
SHA11a61d84a41ea6bfab827f96b0e92e4d5b096881e
SHA2567c10cca265d246f1ea09bc490586a4806527d9c380c3089b8e5708afa4bcffa7
SHA512f28add37504a7fe3938497cf8d5f09b3b3b8183a4ab6e9a27a7ec5ec8bb865d196d23d73de444603dc2a2127bdda45de51a507523cb3e2e1e737f3389c7c4eb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e788ff19cff2aa0c63252494d56e0f8c
SHA1d37bdb49e259795d27bb4b39c61912b73b6d20f5
SHA256d0a26b77e1db0e58dc8b1d5f455531b7827dc1f0691c9eb4dee5ac1c9609c2c8
SHA512b121575a3104c6f64156ea2c67601a2527d2a78a7b06dabf4c7c48f558756c0a0d72b5391980efca1882fc387be085795423373950fa4f55aae1b942d183a4b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f00e9422bd59eae43d610a35d8f60830
SHA1cf0d113e1acc8ef13c84bbb2be81033e05aa75ae
SHA2565c69d4e6f11f39d9ec110655b0f6cf0a3cf017aa7f05151629fb741184634167
SHA512cf5d42b49055b42512a7717f5e25532f31e1a42d2a66b38152e1923c14bf2f08ca20c7e7fe0451c14dc7b444d4bbabf329d2cd75a860c40b37ca7ff21ffed31a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f6b1751f629a11a081ac18619a0ce11
SHA16e9945240ab58ff8284ef92756b7008a5ca180b8
SHA256ddd59cba6560b74fc3a7971a8e279b86718f695155b940757c58da57e942127c
SHA5121166608db223ba2e80a7fd65432a73fa7662014d81feb3bb367c191b466824928579c9bbfb2616791fe04eff151e318f45d84ddc89d9d475000f744b7356ac9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fcaabf68ab55cd35366dfd9cd187ff22
SHA10767b8764804ce01105bc8dec0635f013cabbb9e
SHA25607fec93023ad2d55c0d438c1b23c6d4ec5a896e81208b52a6f378058199fb962
SHA512bdd92396ce19e31bd8bcc37e25bbf9781e67aa8cb907864bb3a7abdc5cd342f5aceaec731dae8647d9fbfc488c0be6d5040aaa63169732471ad990502f9d3b83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e6935664f1b9b60afac147fef4a922d
SHA177d30bfdcec898723adc4acb719a67cd3476fcec
SHA25614f1b69cb11c4b0647b7a989a8b631bde721361f82bbfc162bd2eac3dd773156
SHA512fe11f6bf8d096df2cb0227f781da7dc9ce041000b87846d8f54a55a2e1ae50933c9ee2322fb0044368a1dc1c52635d73e7acd38a43badf8a74e7c7f67a3aab11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5703911cebe9b8f123c4a0950cb26d95c
SHA1c10c1c6b07c209a021270f12d8fa42d4d39080e2
SHA2563e273df427a143dfb0b9b0a1bc893e7e87b6254925439be238b8b32ff226847d
SHA512d479bfdb242a408d2e91fa77faa098689ac8796328fcbb3ac30ee6e04e4addcab49a98d5ae3bc7d2fb18deb812ca0182f37412342a96ec314cab3074344ff253
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51c9e586fae23104074931852bb1d5f09
SHA171522ea0fdad875d8af60222a28abc1486db438e
SHA2561676447bf0f8070142ab3d82bccb89d11eb4d9288300935882ec809b23b60178
SHA51260a0d7a2204573f751134e519d299878c829b0894629c88c481d5956c2035ef4514481cba0f467c85eee4f5d170183b2dc9551df20a35802f9ad43dda3bb11b5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a