Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
69c5a65eaf36567a48555079476c4979_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
69c5a65eaf36567a48555079476c4979_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
69c5a65eaf36567a48555079476c4979_JaffaCakes118.html
-
Size
744B
-
MD5
69c5a65eaf36567a48555079476c4979
-
SHA1
7cfda9162cecd816a6e8f4bcb5ed4f2db33f0ffc
-
SHA256
06c00ddd8a83dc62c6dd5eb6521326f93faa844ddb613686c09484c3723e67ec
-
SHA512
ef33aeda4d7ca8b33ad3c9130830c04b940da83432ec692670c0ede6cefd2d0b6252ea8dcb4b24a0f7ab90a9d528d547ac419eabd3bdc9effdb613457cf7f60f
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000003a686c53a17f881126dc51ec722209a6b52aec37a2703ca3eb9cdc8bb7290b37000000000e8000000002000020000000b2bea971123c8f9328bd1d3ff6adad108e122193d877592ab2f2f3456600138d200000006076cc32327bc91f4f3cdd7882d23709eb0178ff9368d8ee6fb7f207f06635a1400000006ae1b6d497e017314b4a47cd103cef995f847d28bdbbd936b4a4deb325a112fa2cbcd1ab8df286f3dab1b1510260b1e678bb5d2e0dcddbe0cfddaf0d56fecf0c iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A4BF5F01-18BF-11EF-81DB-4E87F544447C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000978a916a2c53cf3c601e0ac5efc6d724866496a4548cfaab17c968ad071abd19000000000e800000000200002000000096ecfc288397208ddbe0358418ed1ff0bd948ad2da529265f125f3f05f30a73f9000000045be4d2fcef0fce2518bc9d6a552723e599646cf3e147883f7ab240efb72e7c7d48b34ec99f35bf4f00718163843bbc98b27d70ea5299f4323dc162b00cf7d1207c89e2cbc73454ecdb42590637ea224524ee2663b580df3beab05659980ee833b8f37ac887493ff5a5c998efe038fc609def9835477ac495708b7974c56cdc1f2544cb42e517e240188392edf57484340000000f1e9ccc61edf71dfd84a7cdfc4fbe835f004dde426b61b7862c6c1da25712c42068124db1c2e8b7f526d1c56496ab11abb0a87a67e95bb836353791db4174514 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422601552" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b00c5368ccacda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2180 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2180 iexplore.exe 2180 iexplore.exe 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE 2448 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2448 2180 iexplore.exe 28 PID 2180 wrote to memory of 2448 2180 iexplore.exe 28 PID 2180 wrote to memory of 2448 2180 iexplore.exe 28 PID 2180 wrote to memory of 2448 2180 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\69c5a65eaf36567a48555079476c4979_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2180 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e20cb8970af0bddda23619359d7ec16a
SHA137fc431d12fb8d99a961766477f6377493cdf02d
SHA25691f43598752fda96da0d5343a92f6a22856570c58c0adf9f9439844add89d38b
SHA512c2d71764dad232a162a5ad588997b375403bfd419b055f3adf41cc4b602267e9e2d5142b14c54c7941c7efe1db362be184372bd3220c50d949cf32da3a9e1177
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bb1184cc18c80fd89244a639ae15f701
SHA1a228201519fa42d2674b328b286c12f609173f6f
SHA256949796d6c4e8c5173d4a63080c569d11f716b09b63e4e0f2b96b6706dda48da1
SHA5120d101f0dd7b8157b625345a15db645c3a10842e84f2a6e4fc5c8c52ae4eda4abeda516d3bdf3e2a0534c067cf00949109603e200969970745d58fa5ee62a1b95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf8243ea037698e0c194cf322dfa9417
SHA14b77226f58fc45fc20a4c9bb82317fb8a6543889
SHA2563cb4a2629ff1e3f1889a43e33d3d38a5f617bf1a6c25e88096f21210236f2b0a
SHA5122f38dcd8398f5e223942d26cdfb63de5fa50459dc35dd1f0276ec58a70de3995221b2faa8f4bc89f3ae134f4b50b6860e221dc185787fda6b6d29055e8ebf322
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5941332fc97cb63d47e5397524e1d6501
SHA1740c74d61e50b1a21a81dc4a2dd55c29a99a7a0b
SHA2560a67bfcccbf7fe60d2187cdacb835afe2c47bbb92cdcc88579ceecfdc317ea2a
SHA512137f4ce16f4b92e8738d1138c02a55c41aba92c32074478ed949fb14f2ded450902132f5ebe3771f7a12a892e418d6e25cd5b3fc9bb630425e57053cd6202a55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b846a11bf544b8d7affecc765f70eb5
SHA1d39d2f5832a67d686553f87235820e1dac7207c2
SHA256ba15b468c63c42ea9b3b4ca59ca8d7d9192da8676947757c824381f685b417fb
SHA5121e36aa43b69834a2318c51650f2221cd6ca3b3ae2eb90028da687d784f511cc1633b16b5ff634234942d0ae3a0ed4fd3f365ebce0e8b5dcbf9f11bdf6c2e179e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b92bb51f55d5798ac7636c5a8cef66da
SHA175c1fdffe0a38738bcab8cfa36a1a8e904557c24
SHA256ae951db47912c418061c8e388f2d74c0774a810e7c83b09417d42a7783e681cf
SHA512188cf3b0625294c8e8a23158aec20da2b6dbdfd40675a739f57fcaf43e21ec238b715e9c3cbec2b64e5069905606af0a98c94641618e2cfb30f1266f98ea5828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc70658b7dee9025f2455918206b65f7
SHA10e0f2903d97d03b54e0bc02387ef8177185ad95c
SHA2569d862cff8c3630f366b85cee4159a1e97b7eb77e66e5acccabb43285c486ac18
SHA5123aa8776f7a83479073868e7b6bad641e1251dab986bfe6a05bae25ca82c60aed117b71ff06d6fc3960554c71542779074b425410d2562b3454b06efaedd48d47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c183361e5b756ba504d09e9b55503d57
SHA1181ec15f0765807d530e4c66604118675e702f89
SHA25645f5dbe5cbe3242b53391dba0155a1480a782d373d93d68b2a8ccda74ee6cb16
SHA5125577c2a25274ab40a106455744f917e9628b064e5ec6b412c7814a401827b02ac10b1b4346ffa6196384e5e9f54291089756fef8a3970294d1bce9627b6f4c59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5142f1697760213ac558635681fcb39e6
SHA12d7491f707c4bf84baf95a17abde532825b07697
SHA256cf6107fe18812bba9914e22812ef6f455196145d452fd7d17383f68e21111ef9
SHA512b372b751c614a738ec0e7c47ab2a695ab801d5ed87c43de9931b23d0d0a941a8e4608282934c562671fa30ba35c6af290bb5c6f0a6e562e16943d678d9cc0d36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59049d42eaa366ae30cc45d756156219f
SHA1af3ddf2e82251d3d8c0f29b6713af067e109651c
SHA25662b4e04d12e1475d7456ce79f879b35ec1e657d9da323821d4eb87219219a97e
SHA5128a9378fd1cf25dbebae53dd536e5e8dde0dc3b5b2cefb874543a9ef14178dd4ff825358004ec598183cf64099ed2c5b63ae495270f789feb7db9084221be84b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51d7c17ea61f4dfe59c6a3a6d501cba88
SHA17f5caba64aaa4c8e4d6ef53d11b831fc62a08c82
SHA2563a26bc088a18381c1b3fd123cc10849b4b7561a0c948561a185f8c9c1a692cc2
SHA512594c1021e89f7c9fdd8057609af3404c13e4f2c0dc84005f437b159eaeaa1d7f3852cb6c938bbab1767c89f778b2798c45bfbf2e22d89fadc96fdbfd3b1ee064
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a1f50b93d75e01964bccf95bdb68f841
SHA1aa75de88a14aac38442dda0baa56a80e92ee3a0d
SHA256743e74cc96d1959963fdc2fa98670401354d963a6be355fb2d590c12e18d7f6f
SHA51268557da5064a65666dd06857c60db097a5593109ce933d20b9776c57396e6a45821ee313ba99ba8975af5b83f242f625bd74a4c50ddd4f307ada74c46c6aa961
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f1146eaa830c4b3f90cf11a143e98bcb
SHA162e40d2d17496c504d0c85b22129748da5ff209c
SHA256a1794e805adfd85a57466831f1f9b9ab9980d226d1283c48809913c5c95a4f14
SHA512b936b39415383123e5573ec4e9aea3899e090f8326cf915ebb7eb851986a600ee35ca71c17ef94209a33ff73cfb9a95a98ddd7b03df29f60820b1549a50efa4a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c6cf727f578b983b61728ecc3b5b8166
SHA10302eb9b963b85c1cf2d92e7aece09824043f758
SHA2566a3e533fd8adfd612a3317754abcbfea3db33f9e36ffe38d356b599cb24e103e
SHA51264cc5aead153e58532524eba321526b361666e11351d1abaee7b0f54186ffe25af38f19cd83feab9de632fef70934b69917857f408bb3139691c2169f8df1181
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e67ead2b5bde21c05b9c510a3fa9b58
SHA172889921b9e546d72ea65ba158f2797b84c976e8
SHA256336bd657fc88f9087ee54195829a5ab5f2c321925d7ccab8c3eba75f395177a8
SHA512b51c42b799ca2e518d12ac5eb8f8988137f494061472ca2f1f57be6600c449e57efec0c3111a7535b151d579da1b281ff544e57326d99331524d2aff143a4924
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5415afb22d2f1ee0da53902601603600c
SHA16fcdb1b0c96f25970b488fcaf2a52f30b149288a
SHA25636a16573f3e06c413a410e64259be3f66c14269d1044e9afe8ca613024a7fd88
SHA512361e36595a5a730c5535481826b83ad30305e21e04a92097cf418c914a74b53752c95e79c0ff1c010d50a132d9109e7e4c7219dc9577b365b97e9cb385245cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fae854d113cd55f4e13424e59e9c6292
SHA138beb2b90a726cdc569c44a4faaf7515f7bc4289
SHA2566faa051b7db0e92ebd46b34412d4955bf1878ddbc3085b83f16f0869d768af37
SHA512ae7442cbda9aa436756a69f968d7daba32a77ca7daf9d4618e8ec7414605eb946ee2394e81756f018a02c1b27b5cef1ab119dd3c46dfd68c128c130d0e06d4cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ec0ddc09218c65553bfb9f5825758453
SHA1820cc7b49f23d6acb5379acc0b5e78bf073f3ab2
SHA256521feed6b401f817d7e0077626924570fd54d3e109354fa05792d0a26d07dba5
SHA512e59870ec31360d88839ef826677e22c77d2240df9fcdc2c2083803b9a49b612c972b9ba3188f426f6b33cf290821eeaae7a9cd6cf68f5ebde6dcc2739772a742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD526ad2d44b876099440094d0646c0cfe0
SHA13cc5999ba329955a8b3c6273a65884b57ad343b0
SHA25634231e3aa89d20f47d2d15fc1f00310febcbc6fc0ab3542b3a0c96c25e77ea6e
SHA5121ec67af80e201a35ad81115763d21ad2651bd8953b24d8f99997fbf7e428d25ec3550062ba14eb9ba28c4070a0b5d910554f4f1e5bc493ab0a44118d261476ac
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a