Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25/05/2024, 00:00
Static task
static1
Behavioral task
behavioral1
Sample
703932a9d8203ef140668f27ebf387d4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
703932a9d8203ef140668f27ebf387d4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
703932a9d8203ef140668f27ebf387d4_JaffaCakes118.html
-
Size
43KB
-
MD5
703932a9d8203ef140668f27ebf387d4
-
SHA1
cf1230372547905633954801de1a84b30084cde8
-
SHA256
3207a1352aec97e97fc7bdca5ed9f5f4c6e9c1bdca3450cacbf9b3448fc2c79a
-
SHA512
fb8e0bad96494429f6b22fa856191b90ed8975a4ea90e76ab2f397336189b6dbee60dc486d9b68ee97c4231c01e9f0b14be6a8ca9eedfb13cc94dd7b3fe9e27f
-
SSDEEP
768:gIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZRNZ:gIRIOITIwIgIiKZgNDfIwIGI5IVJ7Sqy
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DD789031-1A29-11EF-805B-F637117826CF} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000760f6fb6d7365248881a38bcea68cf8b00000000020000000000106600000001000020000000d5fa5a0d7ad17b42e411537be68161d8423957be1c16b8ed39e8f3ea5daf3ed6000000000e8000000002000020000000232107247714fe34cbf3b61981dd0ea6fd4a775c057cce28b3027ed0a6852b19200000002bce812528d67411032e39f72c38dc80a6a382f27f30994e9e2532f9fb83323240000000b5ae724adfc78cacaaf582e889afd5ab0cf41dd59812ebca9c434c2bc5b6364a59b4948340f94fb0372e26a908982e8c1a210b1911b8b6a184185d802b11206f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422757125" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20a940b236aeda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2416 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2416 iexplore.exe 2416 iexplore.exe 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE 2372 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2372 2416 iexplore.exe 28 PID 2416 wrote to memory of 2372 2416 iexplore.exe 28 PID 2416 wrote to memory of 2372 2416 iexplore.exe 28 PID 2416 wrote to memory of 2372 2416 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\703932a9d8203ef140668f27ebf387d4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2416 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2372
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f3b344664af0ce45570e81c8baf43e22
SHA1696df99e9ece983373529d6636cc59911ee31d77
SHA2565f54b04e4bd996ea7e497945c29098361cdc69ba6afc7fd09b41498908b77a86
SHA512d46054f2630a334d92cdeb975afa282b2adfcb9987da6367c82961e6c0ba7eacb5b9fae572ef4ecf1d263cb5b9ae89e32c101fb9ad4b21e69b893f07f2ac01b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52627b52acd699f316a7edb9e8fe36049
SHA16fd01d0dac6497996062abd3c756e703c26e414e
SHA2560cf5b0320a661120b3467ef3c74c5993e0436e9f0550a342d271f64c6c8cac56
SHA512155d2f3eefa3f5aeca16818bdcbd97fbe7d76efd591490c3e02734ab784e445119abe14f3beb6e3bfb9f1b21654da4908d406004675e94eb185e550fab2e5821
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55f4ff1d2dba3577789f6459a0171570a
SHA1cebcd4a73d91869857d4fe1d4517cab2174248de
SHA256f925b6d36cdc313b812279d4b3a874e791eb539f978fe28cb6e43cf69c7fad92
SHA5126b090e2c51b13b0dccd4b04df62cc5b72ae5d0c317dedadc8bc5e7683e1a1ce650125bc0ac370280eb5b63030d21caf1a2dee3e21e625dc779b00ec7c90b204f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD501ccb92a679612d1c73b7397e42aa460
SHA113804ef7708a298bba02aa51bda90256d827f691
SHA256b4e5f6788d56070dd10d1b5019103826a1feaefe58d35a49d8dc7edcaf6a044b
SHA512460733888bb9f60663ee1331bb75b37a533ace6f7604f73abd7e1d674d37b4a60fc86ea706e583dde963c3ef1af17020b21bb8987161be064fddaf4eea035aa6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52b37775fc722bc538913bddbfcbbefb6
SHA187ed4879101165e9a276b3688ec2e07d9714a23d
SHA2563e99117932e1d45fc17e08c5c9cab3da8496d292ab20461b206daa795fe9f939
SHA5125cc780e8a14346c84029d923008fc9cd5e933badb652b0a72b2767781158c71c3698fae249a8a692b973920b24430102214503a59aae65b1354ed936d251e6eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ad224328ab836ada4a106d1ae794df83
SHA19b27be768218a4fc4039bcc12670c37b87ba9310
SHA256d59b65dc789bfb50dd13d3a142940ecb23ef4935e3dfaafefec67beb220897cd
SHA5126231369b7a8febe2f7d067f3cd4993c8b0350f3d472281f28b21c97d09808f54a2757e2c97c1224c64ecf5d663e218fb8d3a256067054ee3c399ad7b45081f57
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58aefa9e5aacf451926595bc31b03b245
SHA1596cdb90228d06cd3c3c0af8a42f6966570d50e4
SHA25645577d9b8a0ef8834eaeabd15bc8d6f38dc5397bcbd4d505d8fcc6b126518791
SHA512eecdb73a01745ffd771c9a87fc1d12da52f0bdbf9d6d11c054e10ea2c83108801bb60aba2d2a6bb4d1b4ea13bd27c12243d319cabd28f9f3df660c3c70991b4b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD500be9000dfb85ff6a06776c4b2f39c88
SHA115e15b1bb16fdf47c913b17dc8b469446fd56f21
SHA256dc09319273b322df49fef10306c7e3e9a46d637ed5d844cdfa5f5ad953f9f1c8
SHA51207e24e5424a7b5ed10fc541fa10ccf731db0172cc7d93e9d7500b8f4c36b1f3686d0b0482a6e95f1c16abc7af8d14a7bfb811792f2d5bddc3b5ba7086848492d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf89c1e9e7d2cec62de65343bc625b83
SHA18b809d2f1a2ff4507b265c976e1013c04eca92e2
SHA256ecc46810092ea39b43df63e2f26ef647ca75ca8b5d456859092d7169abcd85e3
SHA5122b2a1e615fd5f8465e4839b3903a6a859477953fe276966526835bd28fe3bc1922cdd2b2472cb2083a20d8ed54949f2218914849c049b3d2b06c09f4d1278c98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c0968a782f3239375b3752bb2709516
SHA12414c40f5d2ef300db95bf6956ff2423227136e6
SHA2564ec805d3ad9fa337b0db98f0362878f32d2707f885bba0150d50d3cecbf380ae
SHA512edb6ab5661321198aab0aeaa49d1a4dae8e0dba471d3dbed85d1bc040bc46c1cc49c9eef0d34a3b21414dcfbb4520e03569e9b1ed2fb8741452dd7efe6cceff0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD508a88b1923ee96a77e20dbbc371e8ee1
SHA1a5f0ec6a0f9ab3a21ac1a157ad3a85d14cfde0b9
SHA2569dff808a83a8579ab935e03bdef181264b3a7ad4b8b0e7dcbbfe1e09dbad3a5f
SHA5126a781d45e259ae68bf4f1ae650d5308e455f7c8f53e53c2acf55629ec04df9e142d2e539355a6bdac970168c1deaed7156d3b41b04fd24bbdc593566ffe31a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b65b838455ac6c69f346a13af1fe797
SHA1a1acd710c4328b2b47df7d997cda14dff0bdd908
SHA256e114cf75b2a995661c3a118b4597f2f1d441800b0f03b48d78f167f4897bd40d
SHA512da27c521d944a07ab8136963d2df480dd7eec8fe72bfbf2443a24fe69856ef53e2255c87c859d34b6f6a24a875bded8e045a95e5fd5e3109f1a742db92031e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d640ebac16c652438886b8ff530c1162
SHA1f420a9d6f3bddaa54086ea9a36d610cff8493051
SHA2561ca4ffeda9f63f635ead3ff87e6225d77ec1bdf6a4e0bbdd0b311b3658ee88ef
SHA51274b7f5ed714c51de3e1facce852fbccb94b053e9a9ea0810fbd117e2f592aa8b0ec5481bc23785bb4aee0cc7ae8e2f1641bad60d167accecd448def67d16bd29
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ea66b14b077edf95d789d688d9aaeb51
SHA1d80467a3a22d01c3403d2213f35415fb9556a62d
SHA2560aa6badb08b0d5eb257250c1df6b62938c8e7724329d31a98f6277655abfee9b
SHA512732296f4e279a74b7c32af7c0d8c03293e94bef4c849e37c6671d05c80ec3f57c76892407a3352334b85d33110ab9c4d11df1a1bcc2896da2a8613ae10daed5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD595f91f9a4832cfc737208d4d569bbfd8
SHA18ef1b07e3a77dde5e7431cdd3bb5a4fc16e9b2e7
SHA256b8076ac40ac58a3684ecdb9909919d15c254610568c6e34316f22dc97b5ee898
SHA512e4e2ec6feabf25841e89c15ca1b8ec21ab0126217d56f5b2d411446b986e59bbdf0221887468bee1d492ba17dadc089fa318f0c53f56456f69a872f3754b01f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a8238bd0bd1b00bf2a8c8e6b3805d81f
SHA1e3428100742a652dcacc3ee898048a8b6c4542c2
SHA2563201e836a90b0b41c5f4d9055896092edf92cfecb6d9642be41ca6472e60be20
SHA512801da83fb640d12dcb403192260809b083367d8de1d6f3489e9fa3d6c0d4f5b39b06d358b5d7d57312d2bceda4dd0ea3d8789dbd7b3ded489a92aa791db95411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58ff69304e4757c929172639edb866342
SHA114e95ed3a4d1cdddbac9366a35f3372004b6d9f3
SHA25696933a4b670bb4d8a57a6a50bab30834df1db7aa962adae7e335b79e8df2fe80
SHA512fb4884f1071faafd259d7b4e8830ffd9f1ca461b74f4a972c65cacadaffed7adeccb2ded8b9f8df9aeee7841fdf8afe285adaf4d31558ba727b213e12261c9d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d743221ef21ef4174dd874de325d2df2
SHA15434cd0e2896f057fb73a4ebbd2f9386d5fdf216
SHA256b658975f2b4e18683b11fba393e01572a4544e63acf881b49f7837b8fef58f19
SHA512ad00a5d72205c3dcbe71941ceca546d52d40e2bc03ce891a704aeb6efd5623ec04bba824a179ce3ee9297dd45178411e5e0c1bf969fd643a4798b26fd1f5ae89
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5099a90153162453a98272ee8059d1e4e
SHA196618eb26fe08fd0bcb56197fc5ba15e2f043d1f
SHA256eb754a12510ee1a99655aea97abdb2f3aef5af0db4b99b82e27e682d65379e81
SHA5129e5b95a612abe0bbce8571ebea6749ce39d2292bf81c3fc30c0dea7a799e7c5701436fb30c5a27089a4f59c55f3e5c2f284965bf2cf14ac112ad3dc3cde5094d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5430f466c53ddcb07b6cbf7b2f72f7735
SHA172eaa93156448b239e90a2e293f3c91efa23bf7a
SHA256d00c4bc0736b60b42ac7ed999db447126189cceb61a470bf60acbdfd262213bc
SHA5128ce33035fef777f2357ac60d6c26787ef52206b52f060801a388249ec75cf523025b7a67ead07c9ed0b912a26aea294e26de2356ed76ca6198f81d520c3e0239
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a