Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 23:27
Static task
static1
Behavioral task
behavioral1
Sample
614b58948ac95bc8b5a4a0cf6a3868c8_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
614b58948ac95bc8b5a4a0cf6a3868c8_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
614b58948ac95bc8b5a4a0cf6a3868c8_JaffaCakes118.html
-
Size
4KB
-
MD5
614b58948ac95bc8b5a4a0cf6a3868c8
-
SHA1
f5485f9071fdc36f9adcbd2f816f07a63ca9f731
-
SHA256
d694a3fdf08e0e9fc917632a356ac2ae22237f0da24a3373edbf2477f4c7af2d
-
SHA512
de20fa68e8afee0be221246b4b165a0cfa729e7f1419bd79d8ef226ecf06ad217e1d67532d206389dd085c7eccd4fff8ad7a860e1e6859bd15eee3c0e2329dbb
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8of9Pnd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDa
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422409518" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d13ab04bcb58dc691341dc823271b4ee86cdc8bb3f8462b461034dc3e318ad79000000000e800000000200002000000051a0a3c857642b399579ed55c63b4983e24285f9936a0b5397148cfce3f5aa2920000000a9587416e8ad7356cd9c8903638a5d910528607f73b0217305fd19ff1153a2ab40000000dbf9c3104de68c35ab7bc19377656d5569bc1135c1673ab31e4d566af13645a683161cb232453e943255fc50236fb0793ef1ca837131dab15547e3e698c526dd iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 9065f65b0dabda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{87827F51-1700-11EF-A4F7-5A451966104F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1968 2244 iexplore.exe 28 PID 2244 wrote to memory of 1968 2244 iexplore.exe 28 PID 2244 wrote to memory of 1968 2244 iexplore.exe 28 PID 2244 wrote to memory of 1968 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\614b58948ac95bc8b5a4a0cf6a3868c8_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d333416ad525962ebafcd679a0cc3a78
SHA116faddf87be1e10555f7e2779ba30fd181d304b6
SHA256f98b35141d2d0aec160601ca974991c0030b84de9687667981522a54589039ec
SHA512861f4c14296608383b1d9aee29e7f02797e50bcbdf311afb6f3dd81fcaf70777b839f10ba337db3fbafc41387f20c870975a31e865cea204cfbf95b94c84d27a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57db55aa457eb5547cf9cf463c7a27f30
SHA150e8e49a2c5d6ba032e060829586baec048ae555
SHA256635582c16a40926857d3acb7e640e0caeb5ef4c942a8a6d252ecd94867dd9871
SHA512aa4d172edcee69c07f670d31ea70d04a41473a8deb5875c2821accdfbe05bdf4b06fc87557ccfa333068b5f8ec692fc01e23027d4dae99ad1cf56bcc4d5f442e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD524cb84629633ba588ab705325b51b59c
SHA1dc14b3f5c58cf2678e2b03927b5327728f12ff06
SHA2567eb3d0b48eadebece5e4943034a36e8990b3872dc9002298480f678186e3f0ad
SHA5126664f91b4f52bcb2c9b7468d6d6a533f8b5289b2b4b0bc20527e062df7fd42ad204c609d4c491f35fa18ce1b1fff52f9ff52cad45b66d687c5ba56b1920479c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD541e0c1663e58c025b8f1bb2b7fcbd077
SHA14e7cfcd1a107a6262d668d0dd49a1e7d89eca08c
SHA256f5002747087cff1af53df3f4382807eeaa0b169e33ebf7081b7f91de84c9aaf4
SHA512b2efea88d73e18c4b3e85c5723b1925f85fdc13c9b7cba1d2989c8dc81009e04c5d07442281bef377895c0b43947e75dcd970a59310c707bd90e48e7edb2d26a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56fd18d974e9944ec24c2e424a2812b74
SHA16459a12642ea00d3426aa34d0ed548fd43ff3f94
SHA256b84ff17fcc1b5bde88b2b9c0f1f5fd78d2e2eb9f58659c0e16e01967182f7a88
SHA512ed788ac7211978a287d56565baace27a912c0844b27873f878258dc324d0dfa07629a9e0b92cfbd676228ee73822afbcf18cfeb51972f61931f58f5c4856e2d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5813f1229f6ee55f31d60d43a09f19fac
SHA16648a9a665fee64949e4f18c6ff1d9273ea2c524
SHA256a87a15edd5a8b253ad7815704962dcdd27251b4f7ed3916b54987253ee68b1fd
SHA5121e5f9e990f9f83fc986ebf294311f61fd841e55465856b5deaae8948792acf3a089ba113b8e2af36200f5a5c004c53861ce1739740fa3443596aff9a3ebd64b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53f884ffe4c3dd70d8a910fd9e726b713
SHA1ace813db5bb4d65d32ea232a6cb19ea344317dc7
SHA256152238ccbfd8ef64a8a9b171401cc8f96774bbb618dd842a6c5679e8f739cc82
SHA51248e831fcb40a59b5c712120cab13f1acf5f1725ff4d4c69966ea93570563e39ce47c9248f943ea90e66c8701e5edcfea28b973b8f56d130c28a1df851ff0244c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5afb0f43212570da49115359bcb280841
SHA1b64edadb9987f33fc6747709c29e142a8e93c974
SHA25611f37cc964d1fe10bd71df7ce0b1c0094b85fbbc48ad32bac43736d41ff8bfd4
SHA5125320d2883c770fa430114707cf9b10d75359b1c82cdeeafff9554d2e119ec827881194a6ef0bf3546651ddf6513e991cbe05e15c254d579562bdffcf66cf9698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cddadbfc0e69592286236092ec9c4a5a
SHA1903ecb767eca08a6986561f2a478ada70cf6f2a7
SHA256f8fd5583afb909171834faff3e914b2a6e8f16f7f581157bef7b23a65fa9f4d0
SHA51226384e2503a28475983ebced41060ef781c5d8e6015a2fa9f8d1d1954dc0fe19d35cbe7a65410f2407d4494e0ca79d73f50339f98780880452c4806dca56c186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD555e714d81148019a9511b2db06d0dfd4
SHA162eb22c76fb9e1f7932562b71c647a2977e27c4e
SHA256e8453189f8110642dcd057dfa254750591800ec4d34087870d6be87533c3dafd
SHA5120c0b5ff3e52be06ae1a44dfdad60f97d21bf09a8805e098f8222c3453041097fd9c6588695089649598a05644fa4395d0c90cc04efb4e0b32ba1b791e42f59df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d066fbbfddf9060fe8550660f9657796
SHA166c976d9a67580557fd5941885868720b13e73b3
SHA256e7324debafb31c4490dff46d973ffc65c646c25d9347113f7531a639392176b7
SHA51205663a4bafa32dccc16b4ef7caa0f9698294c383e5050fb8130bd40bf83754f02bf50c55d55aed5d8ee5a7df2d04ab016e33374f3e2033c05563ae6d15083b34
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53b99d6db44c5619df9b0efc534684103
SHA112b0852d5c89ce83be992fb6e95b900d74c9253c
SHA2568a86ec84a8614ea7949e2afe45866614a8bab3a021431d5568a8752e2852d58a
SHA5125d087769217c64fc0380e603b65a3b6a08cf64ef962268f040a64b21e9920eb13f96de1baf392557d3a2367cad8379b1070fdc9e2ea57f53407da2e244d2cd77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57e7dcc4636e33fd9e26dba8a45443e7a
SHA1ab687d5212b9bb795838e7ae14592373d0e055d3
SHA256a6b7adbeb5dfa9b42079e7d0f70283ba09f48b5a50061faaf6d27155512ac3a1
SHA512f869ddb7d4f6af60ec2a4de5b050cfb634464ef39da6c0d84477040b1a15cea1a46c1d5508158ff0ac77a46832d7acc27deb0f9d670cbc24c1cad2216745fc1f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a4f610fa83a165a3e2894fd6c7f32030
SHA10b8643aa81fdf1ebe0b9224d494d6b0f0dcc172d
SHA2565b240498773c377a9fc265f847678c84a719a53143184a9686e2fbae508a54bc
SHA51235e01acdcb11ea45d5341d9229a81ac1d72c36bc69346f5c581c7d608f8aaeabf93bbe503830c55f0c6ccc5112e8a3398cb768d736d55bd7150394738fbef182
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8063557c0e3f0bccbe5d6354121841d
SHA1c80cfb64a6298a30e40e6fd332ba569c4c115e4a
SHA25638b3c13a63ad5c16c8b6c388019f3b31f0b7385b4a4d2dc0075c0ae8f06eea51
SHA51219dfc134cf8b31244f6f97a1c88d66b3c978fd3dff25956e2f6754ab0dd003547f21afe5f51b328d85caabec029ae147ff6893c55f5124153540f5f0b3dcdfb7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9923c72407ca066e4617dfe36a83cef
SHA18d2479769b813c5b83ea12d114e80f48922fef59
SHA2561d7aed4a729c21475cd82617f4a9bbb732b1e17e150f7632ac73ff5c3e45aa34
SHA5121d0158ae6b2c213cf6840356f540bafb58e371cbe95bae34dbf4ab2ff7fb667ad5611941eef3978a2807c3e2154e2d29fe46817ae1d8d8631a81541af3bdf0fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae784d0207ff291108553881c2fd75cf
SHA10091a441fd9351c06c0df0cb1c2b3c71185b4c0a
SHA256420ddc6d8383336616dbae3cd5e6cf5203fbecf339cb6a0195fcefae743cf7e0
SHA51237b77390f9da87580e2262b3c11a361bb2c3a79d6b805ed0df3308085168d731a63a89eb22db5325736ffe167fb29d8cab98d7295498a588ebf7beb032e5a682
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8eae92145fd5048a48a783fdc70d1c9
SHA1ea1ae9fe89144d7e984bec0f607df9cc843c895f
SHA25656aee0e24e0e76a1c35c2bba5eacd12365c5ef98b88e99829b830a55219818e9
SHA51242a9e062a8d39a6c3281caccbb7f7ac0c09ffdc7d5b6e4e1393f3f25bec5242965c5829f4a01990246ffbb155eabff76a0e931ba30adcafa794c7d38c7422a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c26eefb5fc1c953c2d816a3c6360f689
SHA10154a77b04ab5c5efcc8de937baacfb12f1530d5
SHA2560061be075ea6ad364b84bcaf9184bb98f70a389ed214dffc6360734fc2a7524d
SHA51228ebafa18581e95424717ce6baeca1a4e0089e0bfe237b71f6cd25d763194df2ee32e3a5fa7a7ed71d9faaaa182b1ae71e14cc25d4869311af9fa72cddf22d67
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a