Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
761d5cf199f2355b5a0610e0eb1b4911_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
761d5cf199f2355b5a0610e0eb1b4911_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
761d5cf199f2355b5a0610e0eb1b4911_JaffaCakes118.html
-
Size
21KB
-
MD5
761d5cf199f2355b5a0610e0eb1b4911
-
SHA1
4756129cce3469480bc27b53ab2319940136e431
-
SHA256
4f0ba8ea9e9238621e88326b737aeede9d720a914d05ab7c4bf04943b9f92ff5
-
SHA512
68ae175f42c8869bea6adfc2cec2c4a68d106fd862bc268788e2af4a0ef2e1b3e7c1af1eed57ab1d65c49ae8c17293f0a7daf0f341f97972bcfb2e54390a5a1b
-
SSDEEP
384:TAicplKBCKXBRU2piwmOHrrASwuDv7yjtzHBrC5:TBcplKBCKXBSXw/3GuvqdH5C5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422903346" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a053f8248bafda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a23000000000200000000001066000000010000200000003825d34a2b51fd3c96ce5a9b676ead3f61ee62daf697bd836803b5eb1e137659000000000e8000000002000020000000c1a8f3cdccd0422485b646749a08eec9f89320513945a263b70a5b2f2ba60b9a20000000a36511500aba6881bf723286da7fc2449c42f22592dfe43bad01dad3a4816cc94000000011b3a9a8ac8e7c3af9f243fbdbd90a0ec5f39ffe2d09b1488a0d8634478cb38fb970b67e442e1069825c712bc857abf541cdc815bd0870a78be465f9c91ac244 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4FFE2E31-1B7E-11EF-B023-6200E4292AD7} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000aa02c21537b04dbd974b1ed3e8bf3b3b0a5b520d3a6f1b3342a66709b4940f3d000000000e8000000002000020000000994e141d21b943b6454bea6e248cc560fffbab86c44fdb729c511df07bd56ab7900000004dd3c925a237af41095d27d9344d863a32752cf60715e3a615b42a6eee6cbd728c0dc4bc6cbab9e60120a77a7694bd85c4f95b99829c06a6421a86652bc9768defa250b15b0c5220b9b5eb4dbb7f0d3b2b4573022a70d20a864d304b0e7ce60166c14d1ae73d0efd704e0668e7b8202ac9421a7e2d70036ec5fe0b7eecdff6add78ce705de02374220dc35fa770528ac400000000ba044d406f42008f49191abeabdaf0afb5c00d8f4a62370bca405d0e56081567887ce0708eb6d43c5c533c18abc99dd49e224f044657cf89fd4417a0757e7ba iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2196 iexplore.exe 2196 iexplore.exe 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE 2612 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2612 2196 iexplore.exe 28 PID 2196 wrote to memory of 2612 2196 iexplore.exe 28 PID 2196 wrote to memory of 2612 2196 iexplore.exe 28 PID 2196 wrote to memory of 2612 2196 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\761d5cf199f2355b5a0610e0eb1b4911_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2196 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5229a56aee23e3127812bbc07430c5705
SHA1d5d41a347756cd6d980e330f57c236d593b51afe
SHA256d4ba018e353896f1626b0f54354466d5778c5b357016ac2ad0776e5b19f4899f
SHA512c8e38e187318f09600a51f47bd658501ce553b3bde25c05fe393dab5597a4b6d99cca5cb14d27e51af5284410a9412797d2d867b7bbcf1eb73628a42a5f4b23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57296a0c0f7f37caa34fc7beabaa87398
SHA169a7a9bb5d1667461f40c37c2266b063addd08ff
SHA256659150fdce7a5851d15b1e8b9bb3401d29029e5603f939199b7296bf4968682d
SHA5120c7fd868c07de0cd6b2fec07a1865e011f7746fa1a318aa433631d99a3229fc2930f33c069378e941c346287dff1e3f2af03f75dbdd1760337d357775ff113b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54b8f97351123ed34c7aa87b2a28a343f
SHA107414a4dcc3b444f1d29052d1f327bc26d5d23ee
SHA2563297e7cb6ebe04e05c9254381ecd2cd9048bbfbe9c7300c889056c28d9ec9168
SHA51226f65d699b4e5c56969a9e87e6a00c231c4936b7644327772b648e413963e340a18a37b8e9231785a611ca93475ecdd41cb6352f3ea33bf3512c58399d0f433a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55b04cbcbf7e5671503a572431f7c731b
SHA1c260c5b857e8a86dc10f6b634297aadb293a29f5
SHA256f2262172e099baf8a61017fc280401d1cb07eeb6b152320622dccb088c17f2e1
SHA5123455c2bcd88dcd90de4228e9837f740472a135bb80773a0062dcc59b8fad96f3ef998e38f2fe4551a9e9e1005e5aba7b2d45d79680d74428a7e381c0279cc172
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c7977c7e44430c237403af6024f19843
SHA114324416fcf0363f41e8987ce3229de693144de6
SHA256c7d8cfdd8f74dee879cb2d36a0c3de5cf2b39fea921f683a3383229e2520753b
SHA512bff57e1ed0f6a2aa93ca7ea0fb0cf75b8dd84033e5d09ba8a7613b37a15642b2fe9d4755b6c7c1360e0de5b75c421f0233ce00a6ee01754c58b3a87c711cd400
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c46ed8825b8904d1e9edd9130f9be350
SHA1b4685888f428bc2a69307ed53a7073915344ed95
SHA256d5c332b2758a848053782d808f6f59ed85c35762f96f441e3e07f50942f17ed3
SHA51252775c021098f23f2a321543ce4483c17d5c0a1810269a1270822123b787c05ff0d7103fa36633135c6a9848a721d92d5577e2cd633b2cb4c12a8f5d7ffb0947
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59ec2557c145a68c68f3fe6f97e1f2750
SHA1ca2653890cd36d943cc9130e9cfca1a339616f80
SHA256b51050e5d772729a5da3189596f695e7f5b8902fd82451fad2da57d44209b757
SHA5123241ad848105b0541d7f2323f1f26a396acda21633971f45add3ac06baf47160e6fc81f52e53bb4120332a343a916dfa555c814e7e002fb9dfda987d457db011
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c0cb937b956759c35f9d8c7fe91e35d9
SHA148920e99d9e0edbc69138feeadabbb0c91ccbdc9
SHA2569bcc0069ecd1fa5d59a1a6ac2df9ca9699feb8cd90f3bea8635e931093c1853c
SHA51233d0d59132a329bdcb6ac66b4bdd2b17143d92e43d78a2ac20c49518bb3de40b830418c64a36f53289b8ffbc1a7a61206d36a6fb5b63edd0c06215ba524f4604
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD581feb449594183c5fdb8695f9c989d7a
SHA100e0c6ec8a64939df6a4cb8f5c5d520941c8bb4a
SHA25621a94521ee8620b560de782125e73f1acae09e0764fd85fe67b945f8e234eea3
SHA5121d00da2f438355f188f31aec4409ff80178b15cade2194986603efe9813d1676136025aa9590fa8585225d5804929cb9136ffb2377107f3bdd0ef004bea5c52f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56297f5e8487146d461c5dfa4f69d61d2
SHA159805dc8a91f2ac6db7bf5eb98229e3a6eb3b19f
SHA2564376c90b9e7e2a24c16d5e7f736529bb80d8fa4e1e3a9c569a4d4427226c0a4f
SHA512e0eb79641a2f84618c0263b411299620000d9a00e759c1af7593ce3916f28b37243088ddae1df2a5b86e7dfa2fad73260951ab761f16e88dd48bc6c3fe6a2a8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5510afa61d2e7f07073c101df8cf9bca1
SHA13b65be6d6c87e9bb5bb183d60e4a8b2e1dc36c76
SHA256ea032bfda91730c80f5e8532806599c334e64dc34535502706af9e05ae3e29bf
SHA512f3eb8116cdfaff1db0a40e0d828e56279986f105e6f0bfa448285420259db504cefac45106b7ce63e03bbafe8620b304801ba54d56c8bf03b2f6a747b4e9f406
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dc7062e824d36e77217ae53d138788a
SHA117f2f201c3146609b822c0e7b585f90a22c09c2d
SHA256f80733ae218e16cf16e0fff444258fa5fdfcf3bf2253382134ff9080a89485c5
SHA512cc4be5d126026b735e4bd4100957a9b27fdbd551768d33f8e904973f59a5be368b69659a9cb71415cb5f4285d838ec22bb6669f7d2dfa81fe02e8d3937becbed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d567ee20fc7bddf42235e7f86563fe79
SHA14e670174c682d8aa4b5764d4bf721eb82279000e
SHA25623171179bbd1d0ede18339cab36bb0292026ce77e5572e7a1ba6990dbc23a701
SHA51207507631389640b470cabeedb3af9cdc964259ffddfd595116780faebb45e913fdde2af522ea215eac29c27499bbe2e82c3765c8e6c93fca7d60e9ced0feac31
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a25b5a4bf9ac1c67fa8def194e903039
SHA152ea15c979a691f99312d428368573a378e045ea
SHA256b57f4a38c5510e6baccbf129ad4fa11548a9ce595d6bd8f8b5eb6769ce14da55
SHA5127513ae8358d9183c0bd2f441210d757a6d0b48cd5c8c3b402fb3ae11fb7d3aa81c83acb3354688e0668db6d1de5bcf58fc5eb1f57d80da576b700a3e3fbedabb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5707cf07c9267665f77f7dac7ee435d62
SHA198d59b132cd6e1c825959ce775ead1f769ea5928
SHA25652a608804bcba1c35e08f258521ec1ba97a4be0104f10da72d09f4d762de655a
SHA512d7257cce0c345a3c00242b3a65244953e296e18383add5e9e797e546b3b7fd84b8bce07d744c8422b326a0b9abccc78f8571abb07a457c8336a07740b3ada5e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549f4f8999cd81487eb86923d51fde9bf
SHA1fd718f51d73d35e3df3aafbb5ed765e5374d47cb
SHA256013f7f94e957e7c79cf9c1769e6c973d078bbaae239efd3f1b1a19c6736b37d7
SHA512edead37278d4d974e6b9378f97c28814b14cd545231e967d1ab419840afe3d45c9f90ebf0090834de908287d0f9e278d0dcc90cbafc840aa08121a155162040a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59150902aab43b615c8c68473c8077dc5
SHA18db1e9aab522fb9ab0280cc69b463617db75dde3
SHA256d413a24054144f803fb9344cb0cb3af2889a9876c8228d879e20707371ca162c
SHA512ff72a79575700e5ee9954826b3f82d7614aa1f9b71991f6cc39a3042a721a9a8a6d9e26d626861634121199d25a410a6a253200f1f042dfc51c97e176d43f06a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59121d134935b88704f448d48dd6c65fa
SHA15924e57c9874ae7b4c2c240d714ffced40e93cf1
SHA2560a31d50cacecf4aae1987d643466c04b2c73b901f4d2f44e14b265080d90081d
SHA512fb3a1f96965f78d572360863241131b7ccf97798f220901fdb89a8ad4104a37a02762fdd2bcfd1fff4d42d41595023cbbb67c01cf73579fe7e29e622f93dc77b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f11c75387eae883ee0013df313cf380
SHA1e0ddde6cedd40f5f47a43564102d033b1428d9ea
SHA256d828c872ecd5c6f211ddcde6f6130add5c90e7f5dd620d8f6ad301e0957438dd
SHA512f4433a8e6516fe1f7c67a1b038d745b3128d21be7da78f63ecf3b13985d2be10be7c2bf58742b2ba07e8fa99ac8f0b284f405e45c6f0bdac3149d7e9de4cc95a
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a