Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 11:40
Static task
static1
Behavioral task
behavioral1
Sample
71d5245cfdcc61d3832c79efde37d272_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
71d5245cfdcc61d3832c79efde37d272_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
71d5245cfdcc61d3832c79efde37d272_JaffaCakes118.html
-
Size
68KB
-
MD5
71d5245cfdcc61d3832c79efde37d272
-
SHA1
9a66615a1320985ecb67615298ed404f5fa6fec3
-
SHA256
752e6ffebf4403b15f01f2e7ab8f6d905a6d397a387ddba85bbc6eae33188702
-
SHA512
9ca05ebe05ae706aa5fd2b9b428b6e7a57754185b432bd986a1fc6e6a7dfa832849ac4b86b875caf8f3df6e174959a98fd961d571769b6345763d3bac49b42f0
-
SSDEEP
768:JiHgcMiR3sI2PDDnX0g60CI8poTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8sM:JfVtTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000c5a5bd95c3dbc67690473f5efb5107f6bc2bbdd8d665c6934165c0693e8ef97e000000000e8000000002000020000000e4a97529dbcd2a032402f6ddcb22980203eb219b587bd8a2603734461f54c903200000001266b75db98a31140ae8dacc6052fa16ed3d10cfd8c91cf10c7cd65121ea050140000000582d39456371825127b58ec905cbfc3c5a4125ddf3fc1daf1a9c50ba4c8377da7e0f538bbbecfd62256e65932e7f73f076c8ed93330edf2866adc52ec47ee96b iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A8964761-1A8B-11EF-BAEF-F2F7F00EEB0D} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40652d7d98aeda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422799127" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1988 iexplore.exe 1988 iexplore.exe 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE 2108 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2108 1988 iexplore.exe 28 PID 1988 wrote to memory of 2108 1988 iexplore.exe 28 PID 1988 wrote to memory of 2108 1988 iexplore.exe 28 PID 1988 wrote to memory of 2108 1988 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\71d5245cfdcc61d3832c79efde37d272_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1988 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5acfe348c0a06787c9e2e0972796b841f
SHA1495a0b2ab5a84d746dd6b3ad6d1a3d33ecb21103
SHA2564a94c9a0abd6c7d5f4df0d02723d3c6f997690f5a4aaa07be8a7c417d6417db2
SHA5129337aa83dccb9a99f97d83b4ed6afb25d3662ddabc77cc16b605d70c9ce98f35909ff1b21e8a636584b5baf129f2cda7acfa9578e6a4bec99380c97e3adf943d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f47384521ece15b7d6496be824b27428
SHA102c68810b259fa65daa1d8cfb19b7ecc85d165b2
SHA25677837a9839748a5d3ec90deaa8bde937c3c2b89c5d86a298676d84bd7782d2b2
SHA512418f1204ed2080319196bec96c8c84a1e46b3a88ba47286d70e9d576bcbb70340bb905fa1b98d7672fb00a0d5195aa9307d4c96c5196e5aed4d8ea32eaf5d497
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b0d6e8319d6cde3f5b32b9005202b82
SHA1c96b5d1196283b13e60e16a665c2cb55a403d95b
SHA25608c5df8c659e87a4913cc20b88a25f585d8e0341d9834e8f56d233d259d05284
SHA5128bf5675c15e35d9d378c7f0baf56138f084ac3b0277dc302efce7a52b1471c328114939629441d6a48e19a606ad2bb903dc003a2b21ae474deb158e386550d00
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56f1cb985bef69a13d63ed2d9a62559e6
SHA1046796d959d0373e53efcbc134232b0182d5fe38
SHA256aa97573b20684cf5e21093f17fb861ae515849d4aa7b61751c28cc5a55da2da5
SHA512c0ef592c292d9fe6ffbb5c7eebcaefadee8a32b31ecf9a0565c465c1dd8e0f06b6f1ade96ead90bd2612520a0472023f9794f64b8317479ad6549992ca5a2b53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ff8d544201326540718a3f1785cd151
SHA1d6c63804441353fa6b67cf550f99ef1125ee9984
SHA256bee2053fda446340978bfbc0a310353abc7c0e8543a44ce4af99c9a6bfa674cd
SHA5128f0de104144d458258fe7ffc67ab7974e53f673c45383b9a446505e341061e5d30e66022b5acb1de19076847cfd1ce20ede6b3941e2cf197d638b946febb70b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e8be14d9ec614415056fdc04ba751c01
SHA1b125080b8739b396471496e00081f6b5325212a0
SHA256d2263065f6796d61011fd461be2c8e28704ef5efad78aa5ead2611f8ae9b8eb9
SHA5123a5e95b15b8ede91bcae575d9a44aaf922409d737adb97803b3ca7b7c50da39af5cc8d7addcae4a473e4ad83f481dc9485445e0394c614254fe7f5abf54fab03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ca0a67ac81240682c10905bfafb6a9cd
SHA1f5633c1da03dd5e745390d7459ff5e40c203c2ec
SHA256beb92bf74180848a1a0f886ceb27c791c72f5381e50830405d2a685c2f93e0b7
SHA51256f6d15f699b972fd8864e9f8cd1ef397ae98df3b048298eab95384755b232ef9fbfdd5e7bc1765b1068a3f3c4b57843055475e1f726ece65126c45285246f3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8621fda39a6a7e9df0f6e57909fbc93
SHA1e494ae7dec7e6cc162e3cab19a0581ddc91f805c
SHA256f9e2cf8765f300d97b9886f04f357ac1f7f466effa3e30732aa952e889178520
SHA512a305d5d08445a21f2506ab3825ab0d04aee7c804e8188c223833a968d953192ec5fce711fd0ae23fd215336ad3599cca2a8d0fddd4ce841daa1f389a2ffaf0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD574a2097d949da2ab5e1f2380b5838aa2
SHA17228b2f4eeeb26a8168754ddf4381dff780f08f3
SHA25690d458095eae075213114c63778bb42caf6febca1322a542ca8c9c7f1bb81094
SHA512e4c4ab2f57798de7e769743b5071c0c15f82ca63f14cf936aea2468f57454b02452b9c749dc9917287f6fc08f4e4c1013ea52520e57d4a2aadbd8f16479e3411
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581cb310649fd5b2620ebfd65ba51a788
SHA178ee8f66133792dbb3d8aa1512085c7cd2298d2e
SHA256baf1173b16cb1ced3563bba4e54bc76db9400b2b0f9dc978b26398942bca0a37
SHA5126c33755c858756bea5d7bfc3b57bad210432c29905e2e7510c3aeb122e70ab8a617f345f513f43c06707a84750eb06960157e916897840a5b0cd58b76bae3b84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5fbf67f8fb2488451f4f6001d33d0cd55
SHA10ece11223b144ed6a21135b67b0e94ec6faa799a
SHA2562a4376c90444224758f01b1deb37069a67b49b62f6a38ada1ad3e251c01160bd
SHA512a516b4d14ba47ec11e04658e9a6074368d0abd0e50cc33f9f436b54407631c7ca54981e25a265f011b2b2db101342885e92109e8a8d1aa46d9337865efe696c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5604472743d1d8b4fdaace66dd6593b00
SHA1620ebc82a5c0c6f4e132374f6f01fb35feda3a51
SHA256aeb906ad1d4faec038b19c42d39708110ef5792dcdeb328b83d2f8db0a23741c
SHA512bc243806c414c7551172be84753a3c53955dc16c7cf7630af7e6a642b5810b5a44970fdaf7cdabbf16643e7a62d70b23861d2598a5d47f2d080baaad011ab8c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58eced215726e4fdf53c5124b15cb96f0
SHA1ea4de5ee1ed1497b2704358b1e5896ae0cb14bf2
SHA256ebb5338d29de71736d3cc2466c9d717bdab3f55330d8211eb2e0b5decd001395
SHA512c326439883f444207733cc3198e20dba02efbd88e6907c6a0affdc13674a8cd9eca1216feeaf9eb28d48b91dce53c7dd71b287209e46a63a318a838f36e97864
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55c7a44486c02992bfe5d67d9769f180e
SHA11e2e79c1bd4c1e40f3d49b2981c8f9975e1984e9
SHA25612ce9c634676a7cd10141fc7401d4a04a38c5681b041f544aafccd120522eef8
SHA512c6f384caf2c1292c8d8bbaa2acf4d11ddab7c21051e91996113f667e802c3903487c31aba2738e0226c5b5f541fb3e41d32aeab3cc197df618c027bb0b5634ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD514fb7b137150eb64f8c0681a17e9b7d6
SHA1331a3fce174117670c6cedab37a4a4092cf6c216
SHA25662c11f68d759341365804bb4049d559ca86127901476aa89fc324689216d2906
SHA51208651b7de8c76e44f9ca95f7d09d81669a0d52b84ed5dc6db31ce20fd5847d608bdd007b3ba8f4e651507d7e39f4456cbdc87089f62e4972ebff2370e36eaa4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5282e9fd088fe2733ce500e7f9f9785bf
SHA128b4e2192bdbdb8f66979fabf5a25a261d4e78af
SHA2567740c595b9a327a4c1b39f10ea9af6fa0c983f856e80fe0a7d8255e9f22a79e9
SHA51204432978b64c0e0ad2b925dfdfaa787763e48dc2cd82518c5bb5f5d46d2562c7f904bb61622121505120fd4017ad12ebb900cc4521e3dcf37ffcb8fa44195d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e3ab4e336cd3bd93a5ff94830e05b6a8
SHA1fc7539f8731eb3b501dc17ad0bfbddb4931fa6e7
SHA256a8260adb971bef5b387ce27e61a8eb0c3ec34fbd6c6c3cde84ec2c890d6d9cc8
SHA512a6db44a90af7ec859ef74a09d516808233dd12fc1f55f82e1e7c15294dde314cc661b531a81be871edea683357a336a23ba3af83262bde24ff3ec9659021defc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8bdc12414fe280b87b9bf030ade5d7f
SHA1438d207276e881c35529657e01882381da803155
SHA256e2f048fcaa94a8873aab8496260f0522cdcb5b722c526002b187eed6f54031e4
SHA512e173fe3251149bc5cf75eaea6956af108b7c1423518de2bcafd995bb97ba0b994a47fce986b5462dfabee0dc460b75df2789c1d28f3e00f2bcfb6a4441876f98
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5abaac7c0cf797178bbfb9ad69b408c01
SHA1b8beb3b3fc0e2209937b02aa284ea7db440f8cf5
SHA2560b768572e2667cf7ac9dc3660402d90fa852cff1d4bea293744157c2e92032b9
SHA5122aa985e576395737f2c8f4c31845b2c36200355f4410ce71f8150e79f8a47f9912bd112cdfc0713cebed0a50434ba3d62b31647186fe805c271c3c478ff4dc74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7122c6cafec67e6876dcca6d9c7ba74
SHA1fe3c958c037dc22aba4c7cf65813a7d97f5f9f39
SHA2560b2ca55a9c4bfae3393b4239cbd0f0da71dff0b21905bf0f76f2a045e6cffdf8
SHA51239b480a08276eb1bb052f1df58aecfdc0a13534a2d7faaec306e60798ca9a71c2aa2f7e2268d7094ae3d84c25c7311aabe7ca91166e243b02b4de1c3fe7954fe
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a