Analysis
-
max time kernel
121s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 23:50
Static task
static1
Behavioral task
behavioral1
Sample
615a00cd191407434d1dd166dd173750_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
615a00cd191407434d1dd166dd173750_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
615a00cd191407434d1dd166dd173750_JaffaCakes118.html
-
Size
18KB
-
MD5
615a00cd191407434d1dd166dd173750
-
SHA1
95fc9f776397a11b5f86e1900fc7f1e617a00d1e
-
SHA256
db89adddfaf2396aa5dd2d7bddcbde504cf2f13e6d0ed38ab29482c2a3ecda0f
-
SHA512
9bc822179f079e360eab89434c5011fd6bf8051099e294790b87cb94e75dbbb9c0160995d40ef4847094a769fdbeb04e3ad8d3a59859f4c217b0cc2a427a3812
-
SSDEEP
384:zirKV9isyOVBD8c83RSr9LQtfSmEfP4ycbp50JZTOpud:zisXyOgc83a90ZSmGP4ylJZTOpa
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000260e8eff4e88429bbc8a9a829825b35bd9b06644efad6398817984b152f94e44000000000e8000000002000020000000e72f58bdb329b59785b5a77d95736d1c981937decf407778e2a111b1f1264f20200000004809bbeda7d61e06a1f69a3b7c576ee6cc3a4cd1740e05a65871ed9da1d68f3f4000000095785dae6b2f9b56936097e8b0e83a8a2f5840b07309b59b2718f75305d585928d378501f2b3e8de7307afb87e51c70a2c1b6b058167ea9538cca98e5b9ac667 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e07e749410abda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BFE04F01-1703-11EF-8C92-6A2211F10352} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000037293a95675eb0d7f0db9e43a385a56cc3e64bcd5c6ad5b0c75c0218ecfba342000000000e8000000002000020000000e9178f4c03fa78d9f343ffa70809a1825eda9da59bc542b5da0d5d1c9c5e7cf290000000140aa7e3b50d0be4f2c1063351cfe64ba4503f3ceacc73cb72544476ec05cda32d796f24b7d2c1f0a6ebfa0bc493a5f1a7e3fe9f976a3a60f86427d5bc43a14f9f68842bd6f485770e0025045287d569e25f84f54bf151c5203d756f3b3e8bb1a52102b4828a6110692abc3fcc4cc4a4ef5974aeb6f33c0924d48d7d9923e66cf486df1f6fc1807d7a59c6bd582f289640000000b5c521b82a173196edea6fae75bcfaf03541927227809133926c81609b4166ebdf041e5255fa98a723e1716b114c7f12e6e16cb48146f2ea1eaf3699805dedb7 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422410901" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1368 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1368 iexplore.exe 1368 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2324 1368 iexplore.exe 28 PID 1368 wrote to memory of 2324 1368 iexplore.exe 28 PID 1368 wrote to memory of 2324 1368 iexplore.exe 28 PID 1368 wrote to memory of 2324 1368 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\615a00cd191407434d1dd166dd173750_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1368 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5690b7c1813c7a7e55b03c044ba373a79
SHA12ac1afabf03a2cfc415d1a980f700d72f4798b29
SHA256ffa8a225db25210405aaca412382da8f0b40b69d5e8ea981f8c8b2a4640266c2
SHA512a76921eaabd76aeb0ef4faefd3d38677e4c53f0fc39cd90e259ebc6f8e185cdb75296a11632eadc3bda129169d443afcf2b555fa14a87f61530bf6885d5116f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53640efdd4267c82fdf47beec1e713b7f
SHA103d7ca2f51859636d899854c4299e1e2bbd5767b
SHA256638103529a719ffc81bfcfe8b2f9dff0002be7ec9ba0c0deaa70af21d476f155
SHA512e0522f186201e5b429c5ec9ef68f4d6b5f9aa2c6b047dbdfa79b72d96d8509bda05c31c72b78cc5316795ca090c6b12cdcb5feaec84626569ed58a42ca9821d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5260c7ab8f46091bf3528fa697ef707b3
SHA1a251208dff86e076d904d9a52148d3df019b32ee
SHA25675403ac6a6350ea4383f20059fac6d0310b3a8055930b5c8d1deab3441ed2d5d
SHA5129fff09418b5f10ee92276950231c75ba082976742950818d73b6051344a9936e848f6e8b1a34ab0191ff7c6fb19f592f126c704c7c3301f456c9f575aa9e53a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51239c7de55759d9893bc9633056db32c
SHA1a7666be36c6c9808c504b92e0a3a405b5f15163a
SHA256e0e4be4026861b2d28df3bd6e0699e6a6ccd104be36f84286c211cbd838f7935
SHA5125580a73a28b09dc8aa2d16d594a14a7a8fef32632cea2c4447afb1ceda635f8b073f83dedfbcd0f9619979abbc297e26762b9a0152c3cb604cbe88e82fe276a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD537071ddded2bdbf85d691270d6568997
SHA1e8079cbfd80cf818acf7c7363a2f53e51140b55a
SHA256c6f9c44031c02cad1f16c4552348b40636ca0c5164380b265861257355b11a1b
SHA512ce3c3ee1a447983210bf3b71fead1be392d8e81aced4f8c7af0d31ca7cf8a4c979b26fdba2855625c975f42a26c9c46de1790f5f709ffcfb2f050924f9d7dd96
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5509d213e4df416c328deea4439f18b2c
SHA14621ccec92cd4be4a60d50dd0c92b55b75c0f623
SHA256f4c1e01528fa1a311f716920c47fa099c472c39523372dc4babf2f9e98f4ef16
SHA512eea54d08ed6f63718f360403033b63b0d8cd7b7ebccc43bf8aeb4c88392661c0b5ef3387c18c71bc0e46a81c649cdfbbd0c09c17c567f435cbcaaa109e194b0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59221115e0144321ba0d161401a350786
SHA13fce1da7aa8d40a1053136ffd131f4feba7f4c13
SHA2566c26ad0c9ef04546aeaa06f2b612c7277185d87448c14d84e4a20200620be14e
SHA51259aa858bf38a70637ee62394cbdea402374688590cb2d9f2c574b20a2e0cb700918724216d2ffe16877afeae387ea10d0f8e1e7607df4dbb77ba316a9ca19d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5688799d42c3d5477f3ba210fc2639cb9
SHA1d225f71695862def21fb1b2d03e483a39116872b
SHA256974ff500bbfbb701038d0f2a09b58748d5ab0bec092c8c5a4ccdd2408a77a2ce
SHA51207e61eede25840164594ad0665ac4a32ee195b2cba5e6f13e1007ad9c2417dd541f371f9f9af5a99299ef5028e43f5ded5f61422178d341fe9368c011857dc6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD591620b38d9ed6e5ceaf4d1bff9a9ab50
SHA1bac444d918db8286902e0a208380c2c7cdd46bca
SHA256d9a36fabd28531ac7fbdf57d5017525d8f91c1d5e9c431926546272b4244d239
SHA5121bbb5bac908618375c522d8ce7ce79fc5cd8d536db6614c7460417efcccd8b90881564f626fd47b339b2352aab825eac511150a2a754a6c34e00ea8586617b6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5963f016dec104d6cd9b9da58e1f32bc0
SHA14e42cb7a6bb64befbb2730e2de171d78ac081902
SHA2566603fe3b81a58d7f247c38c5905e28118de848607ae22052c76cf1870faf88cb
SHA5121fb6e1442f57aa975aa3eb48a7091e8b60dbdbd67e1177a9c31f20527a13864de8d2613a152b3efbe14d8241ebec0f61fca564b7c729cc920c44a0889b7b3fc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5525d5c5d214463dba0e5f038b02a1dbd
SHA13706657806549183a9e49373a6ad387d84d8c559
SHA2569512cca6813a0f4f7dd0db533bd557efdde96bffb86fb18a4948f4a5669e46c6
SHA5129eafdc95dca56b16f533829eb1bd77356c9b2a58e9702e059c457f81ab2967aff5bab9304e809bc720e81eb1712d1b288ae7d78ef992a6e3d7b29110c3584aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5228b80132ae9b0d83b42969fbee937fa
SHA163163a041c2647d3314e26beee1d19165221e7c1
SHA256251df4b462c10c73a0c555da5140fa6356897fe38d69bc7d4fd4231691f761bd
SHA5129a4a6a400e0ef233c39fd9d084a8d8d96e4868adf8c2ff32ae8efe171dd8642a69df5d72921c1e40142a9531711053c714d574ff8ce6baac9572b0426ed956f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5843d81649ed49c9f5328aaa5d6635bd9
SHA1aa9f6c35d5325783553cbb05c1fb7aa41dc79709
SHA2567f9029a5bffb4a1f589344f6f843d938ab568e1b8123465013a2848d1d6af94e
SHA5122359cc902ccb4b5fcd7906db4df8ddc1473a8df6e302560e0a8dbe98dae5e24077c65086cf2babf654d1b7e3f2e1a757ee812d50ef0ef67f9ac8e7a2f6eb03a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be23de9dd8df392e81c3af53ad29a5a0
SHA11d0b2b10b0a1a33667c8ce8be1702e5d21faecb7
SHA2569b7cc59837e3e33ff3cd03c03d7ace42b11a119f832f28602c9fa22a0db0ad9e
SHA512df1b4b843149cf250706b4adb1ea247f40dbce8b6645e61c76b5aa681a468a6c65d6024c3e609fbd33b8c8ae8040f506b1ce368955b16c1cf4a342a1e722383f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515a92320a5521c9a3be68e3ae00ec00e
SHA11e0e2d5e465424d6882e4501777516f3662fc0aa
SHA256ac516b277b118f493ee44e059297a294ca88ae39c8e9606524a158dab9e335cc
SHA5125c004d1607160055457b4de3116bb60f9f8274b8f12e85dfaef0b7ee8410b76605d013570bfbd1d2c515520721a5293ceb8258e488a8ec1c1d347f9d6d95bf90
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8a87ef6925095dcec7d0224b6b0e7e0
SHA1aa078b273961da120d4646daa151fa59f8b509de
SHA25672c78f3202089d685385e64752900e93742bca46e4a86f2ab689388883314c6c
SHA512f4cb628a8ec897cd1013a93cd3ae53ebf4b40703b57516d5d5112a02c0bc33f49c16d7ad4e8bc2dcf6def6af45d3616f1f35abbe2aeda0cca6d0a8713df2ee09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58d3c412dd14ac85531e4064b1928e6c8
SHA1e6888fd658e578cb6f530d661e695d657989d00e
SHA256e7a2fc11b83a2455c13dab8253fb0f096530e2c3d84933506cd680598a4d8601
SHA512e31a2849eedc7fe262dbd050f07cbf16ad904177bbcb9c30ca0d3bf3adf393a236672df815d7b82a7931170c50e1f434a4ab6f905855ec23da6b4a7b1c3f0574
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501e976a2f333d06993a680e16cd92e7d
SHA19b7f2ff4a11cdba306333cc1d3614142c93e9fde
SHA25654f419cb4b216466eac0ef21332a93ef5fd326e481922008df68fe889bff700f
SHA5128c01491b29aba65708970fea9bdf250f66f787368418b3a530c06912f847523e844d9a3cb1ec4579f0d706d8f65a386300c46269f9c943fabc5b1538d013fee8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59eece5776c41d24311c54b7e5a04f608
SHA1abc05079cb272a0b626147f3e88df71ac9162430
SHA256240b5d489c037d16d3a9f6fc94da2a2724ea628fc73c5212daea44c72c8f2cb3
SHA5120667145037219ed0262776d1b25d4d841354143e4768596fa1b5d789a73e4074057cb655fbb3f58406900b90977f3f4de7fba3f1082ddaf5946660bea9822499
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a