Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
771c51f4476eb17d0dd9818714554493_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
771c51f4476eb17d0dd9818714554493_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
771c51f4476eb17d0dd9818714554493_JaffaCakes118.html
-
Size
12KB
-
MD5
771c51f4476eb17d0dd9818714554493
-
SHA1
c50da540f692c8be903d650a728bfe5c0f777f7f
-
SHA256
ef6c6196fa11de352e3cf5110845abe1dc2a22063cd907b8af7ba54c27e5e3d8
-
SHA512
7dc71adbb663baac6ee5d7d00a41e6361549ec2be0242d2993a7af21404e368ee0505b4a7089f5d585bef2345db3f3af4478b8f04a6da3204861977a0cbc1d62
-
SSDEEP
192:1G2BrVJRSpSzNo7vkJZyDV3QY/ZUY/5cAiNlKLu:gpIdm3kAiNgLu
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422926746" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f09d6b9fc1afda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000e5af26ab7805cde1587a50b4b32e59c03be7ba25f7928c2feffb7c80d16f0f2c000000000e80000000020000200000005094ec8b2ab67a657a1988f911b5f968e52798d7bee4e17d20fd6bbd84f3115820000000787dfc7736eb90ad65bf45fcab95a46fde4be54412f92a92469eeaad44fdcf76400000001c9d7088a0e7ffaf8bbda8efc3f6d348611b218738d6e9168bc680a18f7f263895415c18ccffee55a38637164f07439525b8a0d196dd6abdf961f76c7339a6cd iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CADB7551-1BB4-11EF-AA6D-D62CE60191A1} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2116 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2116 iexplore.exe 2116 iexplore.exe 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE 2700 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2700 2116 iexplore.exe 28 PID 2116 wrote to memory of 2700 2116 iexplore.exe 28 PID 2116 wrote to memory of 2700 2116 iexplore.exe 28 PID 2116 wrote to memory of 2700 2116 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\771c51f4476eb17d0dd9818714554493_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2116 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3abf973d9909bf8b451af0584e51aa2
SHA1bb6658d179c43add4270ce8e0595c26ca4c5df51
SHA2565c59efc3b3b4281156543d1b847be352eeb70c7a9ca81df1cdefeb009e8ba66a
SHA51202b0f7dd4e647234b6c855ce3d118c653a19d070f1c8a063a853073542e2bf1f42b86efbb597cf09132ec546bca52751b52360ff33ad3ed4576a9e4e97833513
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8e3c0e7a2bbd7b0c22acf1ad256af36
SHA1591d7d11ab24b2140d91c5d8d780eddc6d81d51f
SHA256dcb7c89c0912d33ca4481856715424543ac6130d5ef176927a5124c6d569aed0
SHA5126f9a5e843ae8d007b3b923c7512b32ada1bfaf715e7807aee36b1bf1b67504ab28ee65fe39d8d387722eb2470995f54f571a281a916a3a532ecf876c437f7fd2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55dea7faaecf60ba7b801f0cf64189291
SHA178b34eca140bfc143325d3b835794f3fe308a448
SHA256dab4e2063db4145efae862c7ff37934469234d789777b8e187c6656739c4ddc6
SHA512c579776ca45918cfe5b64f1d54a411722c182e8f824168db752cc0b820a5a30850b39f38e3dc32d9db6701828dd79e31cd07505ed69d30d18ce6a86f81e8c7e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5252758055e5d3527d52f817cce92ae
SHA188396ff09883cb65f36f0cb302aa4714d5ce0d12
SHA256da99978364a35b01a41972d680d4e30318e416301461d1f8860c047a675a4adb
SHA512325068fa1216e438b4a65e955aa05ad74e4ad10db71803c9c034b4d4e065af826c8d0a9a7ccc8abf0db1e3875fafa75b7bcf28348131767342aafd57e90e1498
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a5a49d1003e91f803c2946daadd1f5a9
SHA11f8f3d7dd73339d6d229ab3934053f141642e949
SHA256ebf79a1890ab382f431de52d0f72b6caf9cd3f0fbca0d7106cdff6b5cfa34b67
SHA512b37adca0421f88764fe2efc420c6d1e8c078710faf56496d34678eb2e35664b1b90433130b3e0c5dddf36167a8d083318e88d2dcf69f8b31647d3b1eae217459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a247d27a7ef2bb7c0641abe9d02e9b8
SHA15532cb6e776fd62765b6adf227ddee4278bd41d5
SHA2563e9367977a6f40b3d5563d3721df1cce1ffbff056c812f0c761963a58e9fb96f
SHA512c2c707a480dfd8bec84b5e6997b7a843a6354af34ea489fbb08aaaaed525c2bd6aac93ceeb328536e6f5ac5d26140eb8ae3c256c6830d7e774035ad149ec5df6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5eb31e1411ed4274750e89f7069ab0da5
SHA19d31b2923c282ad35dc48bf4c9c7f54bc40458b3
SHA2564542b34ab02cbb3288ce9459c2d2e6c22061a92d1e328ffeb26fae7e31f422a4
SHA5120de27ed5fa656206009acd36a38ef7da417fa0a25906abf891d82895c9e49c87580a158ad4ccaf3e34519910c8ff0629f04dfe9afa56791eeec9bf12f8817446
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD597df74d263aa666f6d1d10bea6a39851
SHA1a554995689563c173fae341d4dcdae7f4c116d73
SHA256fd52eb1328306f02c7262154faef61c0bb704451fd5c21de2ebb7cc82c0e7db1
SHA51241d3f998877ee573ee95d5f1e9f954bf76120aa044283a86c172a6efa214f9d3eaedc8461c0a7259bc7f8f3795bac7bfc1b70582431a087b938ea493994b8a27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b76c9d5a216f2784c564ec337f26f43c
SHA16ce7409c05a88c5fb5ea651b26983c8ae3b2150b
SHA256f26cacd3f02f699209091ba9710fa462aa63e4fc20797614a3e5f5783a190859
SHA51258f7e3529bf3f2d115eefd0054887028e28a7438772b9243075f4e1c5a4c519090fad598c236d63806ac11ee7c3d04dff2a5d17e579fb95dc6615bb11a50f6a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f2acaa07767ccdd4e567f115b7e7dfbc
SHA19c1bc56bb6e27bfc82cae871103ab851f8464e3b
SHA256c57808bf0deff495af4cda9eaa23b39e141cf09fbdbc2e6c8d777d8b8b118a49
SHA5129895d949f21536b69c6510f2475f0f6b08cb64931b81fd4d7d0ec2b0775039de2b76593a44849de79e60350f3c501c2a8eafbe09b12fbc37815fad035611c94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51e23cd083df8c71b739bdbb91831c2c2
SHA136052269959026dbe6c0ecba9c3f9c7cfb6e352b
SHA256b1d60b726ca5dfbe49926767cb4bc5c843c702dacb75f99a767cc48488a75335
SHA5128edaecd09f8b2c563485facecc4a17338e5d655ed226e1651872199a52acbb66c39b144fc8bb70bccb6a4e42c140a380f31e57ce0884e483cdf7b1d9bbd2618d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e1ae3345e281c37cfee603f6d4a4124
SHA1461ff87df55a13b073f9897b1865b37658052d5a
SHA256b29953247a784d90b66efef2fc9d41f9f331894622f377ee783272a38806894a
SHA51240243c4732aeaccc3619861e322ec2b53b8194211953a72721f60e2cc376d50203b9934892810d8efe33fb2fa192a0796e8c858935c3da1d386cab554c7752ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c4e8b313f0a8c1f2f3f0de549d1bb8a8
SHA1271190801616abf7d9ca1fce9bdafdd7c87ce2b5
SHA2567c4ad484b2ce035339844510b947531eef80b815803c5c325ba5bf74689f1cfb
SHA512a93af78c0392738f4149af4d3ff5c8dce5856ae8af4c8f822f21160fd42ae54f94eb9383b50d7b39b23bed3a28c7d5099bd6f4713895113549f11405c54797a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5919ff29be157fb9dbf72ebc5b2fe3228
SHA1cf03f6429f832d18260784f512bd7e4b43a92c43
SHA2562be917e18be1c0ec0dc7083923ba8eb9f5a3fda5ee8a24866d6dc8fac229c32a
SHA5124f8503cab89123ab29756b3c2cdfbe4c30ada9869a243d114f8945210328dc1a756ec2c71273524e2e144dfd17f7f3acab0107b6589ede313d089cd69865ee32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d119aab586e095b751c7463364a001c2
SHA10fe72cadd353aebc7fc5d339bb8f10b6ad241f5a
SHA256a6349318bcd9c4ef04b8a507dfe63e029eaabec893526c28b1154b6af269a28b
SHA512405f0b874bdf3d7ca49f3bcb7cb85adac13df8d762b6b17454547f896a1a3399aa5c32450d71f50ff8f80efb86ff0049ed478255a0becfa7629bf50624ac3f4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD515149bf2a4fd59dde846d4f30c146db9
SHA19af8ede833df57f4207d155997d7cd2139cacf76
SHA2568bae01381826779d9b4457200d0b05629879853e11529b2930ff452c01a17e8a
SHA5127b1babe65bf743b0f0ff9e8ee01c86988bcf086306d1f7a1827f098b2bac72efe916acdcb4f76bc9022bf0360ce4b650f07e1ffbe3a08c59e40925c1ea0c4546
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD542eb9e54bbc7cfec2e9d2e7fe099773e
SHA13e47d4179abfb357bd59efa289f377273c70757a
SHA256b5e80fc3d4f4e17f96788b1a78fc0982a51ec5e6e7309ee77cbfd6bb6017899f
SHA512007374fd9b1b08c3f9964bc2342c595676c1c4fa7ef8be99ebcf7ad37cb05b67152f40929b32b217c09c23ebc58641be2c9bdc5200f9452a1c4ec87c1d918557
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD592720580a896f00628a5c7075170a21d
SHA1e11fae4aad9752adfe67fb24d5bb3aacf0f7e203
SHA25658ef85ef44a22705c2a6c69411a1418d555110d001f5cf8cb02fb883e60fa202
SHA512a45617639795e23dd1e0f9a39cdcfb756ca8904441cc3936219cbf7d256a5e2c37946838268ddf7443e443d68942d60986d727357e8236cc6f7d5d6c0fbc13bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53d0764ce457f1115d552ca7f672d029c
SHA119cf9a7e66dfe39a34b0aef4734a96a81fb10cdc
SHA2569c7e664a78297fb1ad439d72128a893b66a30ddc34cf31cb86aec68994d27039
SHA5123e7337e4bb1e2faa65d5470857ba00db6275c5e2111f282b595ec2a38e736f569879ee3ea161ca600ac266b48ce12c72d75e490c217864e24893c42fe013fb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55772b1fe61f3d26650baeeaf796cca0f
SHA1dccbcc8a144cef3e0d9a64eb1d296c8371ea9e46
SHA256d4b3c936607d8f11730a412c31d0d5e9818edfaf134a974e31bc5e4faae3b3ea
SHA512fb95a2e5bb2c1368dfa0a947904567a2500801482d9ab85460253b00f7681fdbf35c2dab34e76e7b88549a1306c5ec737378984929237d0901646598e532bdbf
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a