Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
75229f0095c393cc1a52fbe0d547e2f4_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
75229f0095c393cc1a52fbe0d547e2f4_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
75229f0095c393cc1a52fbe0d547e2f4_JaffaCakes118.html
-
Size
4KB
-
MD5
75229f0095c393cc1a52fbe0d547e2f4
-
SHA1
dda048f91544a938ff260f056c1aea387854c7b7
-
SHA256
fc2ce0fbf439c250804ca7335e14e47bd98094736560fb49524eff70f131a217
-
SHA512
5c0204fff17cf4856d4aaf9395398e885d653b42ab28c9994209f519bde3a13fecc9f7340d7540770ca15b484595fd25954dfff360d2952f5d4048e0e4a892aa
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oG653d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDw
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 908b5ecd54afda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422880007" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8DB2491-1B47-11EF-A233-7678A7DAE141} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a230000000002000000000010660000000100002000000067347fc11922b0f60169856a0c4f21331cc056c6bd526a81a936337b543a0e3c000000000e8000000002000020000000d60570e4141c17c2fdb33214890b40c1e314b445a39afa154842310983495753200000003e456209ddf7b12d80d077b628b7f7046638dc3cdbe76aa41da0430a9bf5ee29400000001bf5e9344e8466c2bfab647e7f7be4f54c9476e69447cc520ad35540c1e8691afeedc3564c5c98609ea2fbfc147d442a277bd0b97502569a018b3f0d2c34c1ec iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000b9829b19c19fd106416d1437fea2d8c8f3f8012623d0d1a12e711520d4fb7730000000000e80000000020000200000006a85ff2166638c0511077f5fae81be84b5bc6d834808934c062560cab1e1e3b490000000b74e46d1dca68b9e35ec3a086af47351f674678916a6ec98ef23d8aaba66a047161c104ff45aaeda85fbe7fdc4b2ce4af326808a8874179f703206378f8366c5f5999f5babdd163d139ab35a614f417da4db75334d754e9fb7e8f02e3493f4479029d00a7367ab646b4b9d4773e71edc6f23a00d976b92937767944b3686da094859cd4eacd0a05982009152cb7317f240000000c7040bb593d737c6a88990fd53b29e8dc67f63e43764e0cc1f47bcafebaa1b5e7808b37034885aa6b242e063bb00fe38f7cdc60946c1bc1f1d56aa55c28ef46f iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1216 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1216 iexplore.exe 1216 iexplore.exe 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE 2036 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2036 1216 iexplore.exe 28 PID 1216 wrote to memory of 2036 1216 iexplore.exe 28 PID 1216 wrote to memory of 2036 1216 iexplore.exe 28 PID 1216 wrote to memory of 2036 1216 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\75229f0095c393cc1a52fbe0d547e2f4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1216 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e9f7eb47b9a8259db3477b070f26d4f3
SHA1923ecf5ed21e719cbeb122d491eda9f618caaab0
SHA2565201a796733c401e193d17658def91bba67504db2572adc16d3a7a567c76bc4f
SHA512743d2143f380a4472d59f6c3f13159344c8fecea5564e86eaad9f3de3609ae0c6af57153cf0f655411b430620d7a2515dd502a3fc2fa9c60f6af9114de5fff20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ada91a480a6f2621728c66b62be391f
SHA1db5e4cb733ef8a16abf7341585bcd63bd3490585
SHA256aaed87e0025932ac427ba487fdf2f3bc25ca567cc004b859db576506a85051fd
SHA51299d384197ada0795b133ff48eeaffcba042684ff81f9121d7779a1bf38562d0e8c188ba3a0824cce63651f826c623e99396524c5c9706c66d02f72feed8732ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD525d3d3f3f7d4bcf14db90d844f9af21a
SHA12de11b8c1b7ea51afb4aa41813998191535ac845
SHA256b664b302a4369bef7f2f43e0ff7f13369652f848d24e5565e0e9da7e15d710ea
SHA512dd66c61a734940b96aae7d4d34b39fa4b29bca5a22f8cf31eabb41efa479da1f20ca59b7d46a64697cd387abed50f186874b307a625552f147aebe1c95611449
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50343a410232346b185920b5ae1066c26
SHA1770e928981d362a70e3049bf77e0b1f2fecdb979
SHA2566ceb67b7e198e0c18a5e16f6f64b791a81ec717a664fb73cad4cc775d2b66407
SHA512ba5ca1dec64c2ec2868fba9fb15cb5153047759521e76f960843315f793cf87774c5ec788469cc1f4dbb544665d7b6033fbfa898c222fd61ce31394570d63ed3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54523c017183978bc710cfe2760251c64
SHA1b105a4cd35206223bc7c9b7e521fc4ed086186b5
SHA25644a450db79be76d24c0d6e2e3c9211ae30bd852b5fc25575e0c4a4a9009a3abf
SHA5120fc6faff16f4df9936a1e7a7c9476cebdeb55f218316e6605f8928879e49458c644c4bb2f15fe69ea119d36d93a685a47104a01a0589d91f41d4bee2a377873f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56af5b44f3590910ec48a71daad6b1949
SHA141cb2bd96779f50026e1e2b837b311ca432be38e
SHA2561adbd0a620d09f8004a02c9e48b672ba6aad5f4566c6ce72c74dbd6f24501943
SHA5129c98ad53bcebd3e6f578b8f750856c019ce801b827a9a9c8877c96456493a48d8a794f00ce1521ab16fcc744e29bae9da09fa0adf67f323836c691b0aa1f4f76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD505070594edcaacf670ce856ffbe11233
SHA1e56a3b3c1b1a539b5ee26f6d78e4949124a749b9
SHA256943e214a5350d5df038fba9d144e2fa5f8e3bd3b9b42f2311f243e5210dcfe0c
SHA5128affb8b49f766905bebfdabf49de8f6c8f73289642c1995ec1490a49b5d80169d724b88b35c28cce713432e456468b55637727c4675d3c6457f72f427b8997d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59e20e9c36f74159ca0cd2ef34fcd169c
SHA175f337c9a7e0578c74b15a390da550e7d39fd0c8
SHA256a6f1289dcd0e29f1d08b9d5f88b9559fd7f6728ba4be60e0dd2b436da8e943dc
SHA512b4a6d370691b1375b4f20bbb27c08361fa5768b20c73f78a2150baba9df62448339cbcf7cf4b8c19be0cfd1e15ead1be96f022178a9fb4f0f60baf0f67d3d335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a89e1af7fcc654c609103bf680e91609
SHA1811d10bf0efbb10dccc9e7e8111b5c302339f75d
SHA2561eb76e3b891a8280a8d5b286c097d922b8b19c98e3e249fdc442f8424c8cac9c
SHA5128b25e3784f04c17b5575b256fa361fd568256e6cc98fef5c78737bff1985fbcb986a991aa1a038b5e73766f387ed3df219e6bd0c491769e05aa4bff27694ac9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56e96c5c38995bb29c30c3d20b4956748
SHA188e02f261ded16a010035f7deab03e405236c0c1
SHA2565b18a5415cd75496f40d240040ef78c7bbeedbd5495ee0330db8cd67db911b7b
SHA5123b410f8b0353e5b2e25ae1bd711d8365587fc1a5348beab05916e7a57ea120c17a22b244a5db21b7029ff5fa2677d6ab2357a4e33485f23a5fa6d6ee30d78347
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD571da55eae2e77471371f183ab4ed997b
SHA1c7bc21ae85bd21b6c75befc815806f1e6ace6070
SHA25631aa5f8e6be2c013b255ba6276f9a4d0f758fb29722a8ead684cba52fdd52a6e
SHA51250a570976a3712793cd59f4d2ba5d953f9f16a740e2431e59a0f57e258b665027730bcf6c924b32c2152a77286b8715d4bb8357bfa731c0c8f114ae20e5961e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b0253626826401680e68bf3135c2070a
SHA1eef24b008f70733c2e0508741ed57530ee66781d
SHA25600ff82737af17bad10c8ecdf4477d5815f14f4ddab0e2c874c909d77175e8106
SHA5120681215d641a423da06a93933c0f0ed264358faf7af46cd5e8f29c6e93843326c8a56d735bb06b0aaf2078943220068ecb08fd6dc77170836fa38e6aebbaa53c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5355592000ddc69c630a2f63c2f7a5346
SHA1f2a8937d58bc05530ac5ebe5db9ef761c489c42e
SHA256845ed21fcf4fca7314e061aa45849fc0f944c76d0e139bbfe9c9b1e782c33b43
SHA512b669793195791b5dedfc299c48e81a006c9b825bd652d2283c58db8ce3a323bc91d60c335139279bcee1c504fa6f14d7784c2905a712e716353bb608a4108940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57f1c29c85693d2f82228e2b2550dd404
SHA1ccbaac9f7b85650bb281acfa14d8da0ad8c328cf
SHA256a75041a74222a2be113f3d4a70d328f188252e4fdfb9f99f1d0da1d94695fa17
SHA512dc09752682922311f3ff7d3f81821b49d12c1ba58a788ef4aa4cb709954b7bb08b18b5c24fd2022d710b12c0b13d01f043f4de91dc70470fe1d2e3f23be67b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD509df5ad8ca0f1559fb025322a690f923
SHA127e8a8e4fc2951864a415b096848b82fe65fdf52
SHA256d74e5dc1f610b6ba4991a2d77fb1f844bb317b20d9494e65fab08a8468f2deee
SHA512c0eea8b0f98767c0db52c3a17b0107db0ed5595ed7b00209f4973d273e189326fea6c77fcae5904e80b7585a67603fee3b0e15babda27a35fbe2b74f9688a90f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50069212a1ad0a3c1ed2ddc005a4a7670
SHA1f99260b76a43bfe89171fbed76996d73e628b772
SHA2561a3cf4f8df7c98d9826cb092be5055b69807e15e537ddc159dd7177837c39dbc
SHA5128d491e82402b90ad71c01afce28c5d2ea67091355aba2cfaddd8dab0a3c18640e1534ff55d84a70048e4be0c555935de28a4950703c72fa2b6e96a282e68f0da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58de690467aed608c0b960241f7aff631
SHA170f912c37e1047bb394764153bf4da696d570bb6
SHA256493e702602fedfbf96653bfa3bfaefb6bf32e6e31c3389d79a40b5f38137f2e6
SHA512f1400689fb9fa2e945c09d867d28f86f4519fc26921cbd833a0b86a09b386b4760d6d0a4e2d9bc5c393ef072360ec8ca52b5fe75bac9a6895ef9cc4180bb1c6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53a42ab458de61bbd1ff2ef738a0edb23
SHA1b4396f08f20e66220c36b88f800d297c05f25677
SHA256e734a4664247cb6fcc4ceac254094730538c6a90d80f047ab6524f2db8d8f8e4
SHA51201c4f85fecdc56539ab8aa1704345c26120850fb1ffe0592c4cd3f10d4aaae616b44b76eba1e2e6304ea26f1a7fdd06f24541309ad90ae890745d61ddd411664
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b196eaa3f7629fd018fb4c58e85723be
SHA1074027aedd5caa2a6e8b01b5e0019cfaf56d777c
SHA2562cb8a0dbb5ffafd28a3cc05e7bce3480e7fa4da613bfa6aae2f1f452d5548723
SHA5129f49de16fa601ce01c249a7f51fb6c88aa3d0236cfdffe0906ddf487d5a3ab5ac14b266e7d5ee741571369cd78a26c1aff7efdaf881517dea80f98fa421ca88b
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a