Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
7622629df024198989f415ebd1e44e96_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7622629df024198989f415ebd1e44e96_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7622629df024198989f415ebd1e44e96_JaffaCakes118.html
-
Size
19KB
-
MD5
7622629df024198989f415ebd1e44e96
-
SHA1
243f25d2bf64bf172e345906ae8330aa63488f29
-
SHA256
354d062590506fa0bd84c253ad8770ca1de7276786216ffe66d3b039c8a4fe6b
-
SHA512
46307bf19681e0e9c82e2b1dc68cd3cd8b885b2fa0301a94b26058f4b79bd507be5b234aea5e05e291e9528cd5a52012423dd505155a4ba97f07c950ae6f2787
-
SSDEEP
384:zpUZCrnfr/nI/Tdi4Jb3A6AiRdDj1V4HnOTsxz:zpUkXksitHD9I
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6EACC661-1B7F-11EF-BADF-D62CE60191A1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 502a2a438cafda01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e9361000000000200000000001066000000010000200000008ef0528d9b4efd4d5d3361f68a24b56c2ba3e925a7db23764aff1c7fdfa3d706000000000e80000000020000200000005b7acb2aefaab7352a164d7d81667c5f1d21b0fc771f58c169ffa56c69b7775b20000000ef242fe495efdba373df4180477459c9072ff26b45b5ec1b5e7ecd81037afcf1400000006821366e2130e33f01f07c19b0440f0fa414122fb35c35befb74aa31b3f0eb48a087e59f071228326d9e3441a0836469d3cde055d31c82b62f2c0d1516e5b727 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422903827" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1684 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1684 iexplore.exe 1684 iexplore.exe 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE 1996 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1996 1684 iexplore.exe 28 PID 1684 wrote to memory of 1996 1684 iexplore.exe 28 PID 1684 wrote to memory of 1996 1684 iexplore.exe 28 PID 1684 wrote to memory of 1996 1684 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7622629df024198989f415ebd1e44e96_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1684 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56adbd994a82ccae320d9acf6036dafaf
SHA1d82bfde78937b83920b0dd03801ff13e9bd27dcd
SHA25606204de40f74d15431590928f4494b879593650b7cdf3543e3e19b918fcc7315
SHA5125f73d6e3f90d6da60f555396b684c94573f61f9c6c988447c4148099a05d4e41b3f37cca052b1f866b9b3b80cbbcc65e532833887ca303c693c8e64872f5ae01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5130ef23ed84e585f405d6ae8d56a2b36
SHA11ee8bc7143cc21c2b5c8542b0ff25cde0848e33c
SHA256d58ff7d332b88fc7e1f3c8b05f2ce5da0726ce7c4703bdc48a35d6b29ff1f00f
SHA51252713c56a79a4224f337dcfaf9d566eab553e38c1abdf731bba5bf8d7ab461c13201521b8158341ec64839bb9ea1c17a85a1a42788840235aeac510a6e39f4f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b1efcdce28dfbded4c67ec79e00dea60
SHA10d2933da2375b84e6aedc316204a99de83de7ac8
SHA256937527e90b6e7683ef2613491d8364ed93a0780280ca4556818057eecc88138e
SHA512d9087deb7e54b117a3853dd9667ca61939b44d15f138e427edbbf2194260b54286c90b68c6c18a679dd9c59de9c4ca2b2db7d931b1280021446a3a9f545d5aa4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD554a3f4ac23a321f5045e3d5cac326d21
SHA17aed336084a59f68a7548a1c438be82618bb40e0
SHA256cdf6614555fea3c37390ddf6bde9d59c74c5bc660787698f922a5a3e478680a6
SHA51239150b31019e3659e2d9227e70fc5c11b01b4bd0ff27ca55db86f24f666fe252b9eeead6c49d085669f71a4afde6f066e802b2875871f93ad93037521f259970
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f6d5dbdbe12f7f2f12475e3322194e7
SHA134438db0394ee34d1f29fdeeba3b621a5e226f7d
SHA25688a66fb850a88d507289bbdf32efc6e4d1cbe2efcc58c59f77e7f95c5bc6e708
SHA512b690ae6623c46faca2b71a6a5120bcb94f97ea686d1766d2811d43d9550df98b1238dba7fbe99d709a505225b7ff6a176cce589765427e0749051929be30698a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD576e581b9df8dee5655bb539f879072a0
SHA1e5386b30571e0b4b3c20902abe6cafd23204d631
SHA25629a064e6ff0f255e43b8fc136d60cc5bb8ef2b23939ef9fd203239fc48e7e071
SHA512d463650bf91cea412660d55989727200eba280d35cb9f12103531340394ad2eeb15feb150eaa88e0af95a3eac21761ba72429537463dcf7b1d22508fe36ac5b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5013faf1eb7aeeb9a4369ffa0604552e4
SHA128b3ce77f79f2e599060cdc0211a67ccb48a579c
SHA25670fa294b4a5723d5749d6a19930c2cb1fe5c5c56b1aeeed2f6fb7345b3855042
SHA512392d67550f4b7878ea0746f32ecfba1f7594cf99a4aba8488e869c2a9fd1603ff88179cb19d14797d136802d1930ed363e4a38b0cb6e60c5afb157490976fda9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ab4b7db8f530cec37959fc304a506b97
SHA10865d21a3eadd89c881268862b8ff95b871817a7
SHA256435f4ddda23ac824821101140f29883dc9c1020c54afb88aa40f9aedc3192d77
SHA512bb506e4ba02009d73eb6d1d1f933fc8c6322bd65e2e0f7630b213b4307a75768bf9fd79775872f0b63d236f9c3dac44ec97c9c85e78cc9d1b56d07d8df0a5442
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57b4cc5188e4acd85342e99d6fe6e6e10
SHA1809eecebd04b9aab20f9ed3e83be67c44e6f8896
SHA25693b1fb60c0ca3065e1faadcf200a569dfe2ec21c8ad7f9fe4b491aef338cc991
SHA512ff343af360675d3767890b319f50f331416ae4e218b0b928304b6da03096aaeb5ca3eaa27e4de0876b57bc6710a10334f3a2db48b8ad859a4e45de1a8cd2b4fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b2da5691a522f8dd8529dac196fcbc2a
SHA105f9d9e8680aceb451574d77cca2c7382620d793
SHA25654c5249c565e71427bbe8fbc1805043ef7a835b036ce9d483ac97e5719a95cce
SHA512f0eaef8db91a6aeaa82be1936526a8ddbeb8cf774457116659c9d6649f3eaaeb6b37de439b606659053bc87aa0f295815ad62afe50e44b229e8e214fbbfcd8ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50f0af618c2d50ebaa822d13dbc1f8dca
SHA1f09601e4b582a97258ed747dc28262b3baef22ad
SHA2566ad0ba0b2b89b66dd4819993e91dcc8d5f2833020c663d54ec89498d286ed6e9
SHA5128a4a9c242a5d293b3a6841a49bce2e13e5ddf495ba77dc316168925249b7e0148fe7ae7fb768caaa25afeb298ac70094eb5a5e96dd762010d325792de0cbb854
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54e726e461942f37fbbb8cfec3bf4c826
SHA125051e3e062b99a90813cfd00508d57ca5fb2ae9
SHA256bfea690128a14db8d743067a02781d12cbd84aae91c3cbc094e189c27d7e9ffc
SHA51299c00e0c2db9028a04305014202b1bf2b65b28b7fb9f4de3fe162733c7263448c533c631a470f64ef3fff107f9a4ddea4070465ad2db1cc32347bfdb63a8c3f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bf0815b45d956c9df5b4063d43817bd8
SHA1dfdf8f8da5f714172682e228e57254bc5eadcc6e
SHA2565dc37b237d86f3a991933d911cc36f969e8fca2a3eb747b6285d5c83f802402b
SHA5121c2795c084b1c24011ff64fab16d3ef8b1e23a60ccb3088e118a9aee84a3b0e859b567d2bece16aa59431148c461c9986a2f3cb9ddb51101e70631b73b3a72ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD58dcb2a3d0567dbe037b816eacd879c58
SHA117a8f3b01233256dcd762c963f50845251c1a935
SHA256fcbc65d47ddbe78908febf6993edd0818041d03760b3eb09fb02e4f05cfa74a2
SHA512edec3525fb722409abe439ec99f59e0b7f8eff7ecda318a68822df87dcb3b7239b12afaba4cf24b7884abe2220821ab98d7091352e8c8e9a293b6b8b6ddede73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5be557cd75f0661eabc804eff55813b4f
SHA1594f76f2abc5837221adbe39afebd6e5ce5fadbb
SHA256df7b413edef8dfb79eba235ea0499a45d486c66d8199a614f9443d66adc8959f
SHA512e652510544d4c5bef4064991ff97b9129b53299892168303c74d33b101312fe033b4400448b14b1c1c325e3eefd1f94d0ab2542adf748b9afeaac6b005cabe94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6017ad77e7a89a8b2ef62539fe1dcc1
SHA173b226bcd4e85fa08ebb56abec6dd9f35478d65c
SHA256748bfd9a1e0df877f9c34ef17d8e7e104d407ac29543065f32b289e7f791138d
SHA512c659d1d879c1884c00a3a5eb2acada276d622ed2ab347e51049409d7bec77d7188547ca701afc6ac3f56aefe215fab3e447be578317fc7baa5c426d1149d1ffc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57a2782f72a19224f72cabc3b40692a0a
SHA11d1c9d34764e7da038d76426fdb1fa9287f1a073
SHA25660ac6a589c39079df97972e7301822a0c08667cb112dcd25e99027577317b4f1
SHA51252e35635e3178bcd3ee85311f5dc926570cabaf2f7c99b71a746ba1eb4841cdd137f528654cf6a15fc9fd9802d6effc27f7f83d18cf0688f46693cbca7e73dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570cb232f42b1b58e00a829dfffe0f2fb
SHA1b0ba47ca91f7df8c32bc63ac9d090720dadf6501
SHA256bb3a87162406e553a7dc2a6a48d0e2495b2dd21f6a8336667b967b62ca7a6b85
SHA512661cdedec2322f1bba86b0fee90c0f51bc9d491fed320e6a298db01570247a88828a538b89af2ecc254fdbd9bf172eddbccedeb51f087de717f7495f411be1ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56aaa70773a675f833550ffc00255d730
SHA13089a9bd44444b86045481eb8ce736e78bfbe4ee
SHA25658b470e4463321c6595c0d75423d1db69b90a32c3d65bc846a9a4e592e3d1dc8
SHA5128f8b24a002731aca8ae41cd14faf2d002d7ead44080a9fcf26b15187de7e2bac5e54c2047992cc1655390d343a93fddddf0f48a8d5c98eb4c6aaaeee37daa63f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a