Analysis
-
max time kernel
117s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
7880e3144960db5715fac6728c0a31c1_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
7880e3144960db5715fac6728c0a31c1_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7880e3144960db5715fac6728c0a31c1_JaffaCakes118.html
-
Size
12KB
-
MD5
7880e3144960db5715fac6728c0a31c1
-
SHA1
8a5fe1eec1466cb2e92cdb43a55886179a92383a
-
SHA256
cf5f2916beee93ee8eaa4dde2dc9f52c64fd710df5a3fdb5bf340e60dfbecc48
-
SHA512
2c3d0796eae4f8966d992c851f2ef7024f2ea982ab60ecfe7534904be72e558ab98300dd0436481183197944ccde016a0e23479bd9f0200f98988083c9204ff3
-
SSDEEP
192:Hl7vFZ7viLDgasJdboxqVL3sbfcMH4ySSKUcMtg4yQGUcMl4yJbwUcMC4yL8nt/I:ZfqXwdj3oSS5CQDEgne4a1nL
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10bd7b520fb0da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422960112" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7B283681-1C02-11EF-B8F6-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000f0b30fdd868fa58a28d603468c3b35784de2d649f6ed65264585329b06f9aa76000000000e8000000002000020000000bfcf07fca75466e50eb1ef2413d0740a39840c3712b2e34da76919d2a8f8644b200000006bb4413e3251241459aac844d706c1a84f4c5d56380cd58f26169dc8eaa0263640000000cca1668315cfea926774704bffdc1a772f91353af1a89e1b86b69ed87f52b4c18a0644a19ef183b3fe35f419b8dc29bd43feab35ccc7b5700e454e7e34170976 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3016 iexplore.exe 3016 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2092 3016 iexplore.exe 28 PID 3016 wrote to memory of 2092 3016 iexplore.exe 28 PID 3016 wrote to memory of 2092 3016 iexplore.exe 28 PID 3016 wrote to memory of 2092 3016 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7880e3144960db5715fac6728c0a31c1_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585ce8ec2bddbe67cbd1e18633c010131
SHA1312125cbc1828d8eb4c8b7a0c154a8834c297bd7
SHA2561adecc66fb5eeacef21aadfd5cd865ba0124fe77750df05002dc45f43f88d11c
SHA512e8424a33653d8c51bdb0c4b63733a64f61579ac019aac21ef091c521356b82cfbb4454921d9848bc169c9f535140a69f438e774eb5416548c4ccea1963624bdf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2e84676f5ed6bd9ed4af9d20a382033
SHA12fdbd74c0159f7b933b6e727ad68adf583ff2d3d
SHA256bef602a9e616442efd641e42e3c82345dfe529543d611ec19c3b2c29a9273def
SHA512e303649c4a3e673bf27e890b6ec40e9af43c822631ed4ab0291332ff7147b203ae3013de30c8b1f074dccbebcdee5fd132ffda4ca73d8c80cea5d2a5ae027ec3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54078574996ddaa147aed821d059ede9f
SHA1b0789aa3e503b638fd0f32e89fbed30a90012e48
SHA2565ca9a51e72c9b0791dfd4fa01980c4c267036ee1fafb86ce010f3046dbf6b20e
SHA5121eae9e9cb3eee69a73c8bd11c758b66bad95140673a890a6b85540c8a5eb4ac523a5838a2e55fe66c8b0f30c014817b88321ca3f140ede2112bfb6467d772dce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53ac126a72f038b501539cdef740e5c99
SHA12fc472aef82c631d38f4ebf4237ed4bebbc5ec42
SHA2569dcbb29b63fb64ffe41b557296f26b6b1626cd5e37a14b4d9bc230439a161154
SHA512d8ce76e64efa7c2f4382f9d14067257464e7bdc990360f71a998d4aa7ef9ceeabcf2afdea285155a0283f9ab570646337f2146b40b5285fd5d779783c363ef7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dcbd8ff0ea61bdebdbe120bc03329d11
SHA1f510e07ea0d22b3fcb703fd3e49857c0a2390a80
SHA2560bb33244c3d0f81e2316fc4c9a5a5b7af40f732c9fcdeca9293f9e858bac2a93
SHA512398b061c678a441bbf1b32389f38b854acd483323ba57ea6bd146f1505adf1155617fe14e26c42de80bd76451fef7e8aa0f67bf71062cfac52842b3c4aed145c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD513a303e89cd0dd6bd9e6b0bb58095aac
SHA15bb814cd7abdd5c1495514dd56a567184f427d37
SHA2563188fa307e8dacea0072b9411eef248b8ebc79dabc1ff4372e0d996a62ee06ea
SHA512b3ce2dda5cf19a051348404a8e46911fc7a9c878a4949ddf295f18169ddd67ddeb37c5ba59786a1d32607678401e8b52b333aac6c0b318cac9533bf38d65a0df
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ee15ff3c7f883fa133ec1c982bab56b8
SHA1a811f484cf0a981fc40be4f946600115380006bd
SHA256af5842db7db3ad7669d35a41b966f79b526f3516411d97120da361857248260c
SHA512ed2bdde499502c480e69045cfc29e9595e384915ddad858a8444721ac40fa8aa04ca627b8f3b052a32e06de0ce1fc7503c8b5170d6aef55c653ecbb63e06339e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51064aeb0da5e0cce629d1c047080229d
SHA1bee9587ddc11dc6aaa99e61e2a60fdcb3c2fa58f
SHA25625803463d97436ec3c57262ab1ef764e2d27177dfafbf9927c2ecf1a64db17e8
SHA5124c60b08750997b3c11a63fd30bf91e2272300e5030e7ea58aa931ab18ca4abcd88eb6149607aca8d63b9f4b0fcdcf8e5c467fe6755ca192d0d2f2bb3457fe335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5402c1c975a1a00556d9be563b34de028
SHA14f51049dba53133da14a84df94b121985ded756f
SHA256716272812a2bd54942cfe672ad84e203c5721e35a0db4a12a3cf90eaec88b93d
SHA5129c3d65130885a976a6f7d2550688a2e141b060b86ccf2698a68339e6a7c2478bc58329374712acdf1da4562e1a075268840cf8ae0f582ceca335446e9d915af4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56a74af999e5c84d156e323f9afa93d91
SHA11e34e9b30ac6cb64faf5d14170a7943c7ff03b8c
SHA2566a9847071a8a0cf95b258da95ac8d4a45d9110e5499b2da7119665e8da6e10a1
SHA5127e9c5dedd0961df933a9e7f9de5450f82844fdd84fb7fc0d7b8863b088accdfd4492b7c7e33eea299691e0b77f6e6879d13076dc0827e479cd2941aec31c43b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59adcdfdebf514494cf66b907d3578024
SHA1024d29782be6da7bac1f41c951255a4be8efeec2
SHA256e690bc74696a793ce22bfcfab56bde4df2ebfb25eafc2ae552d1c5c7b42c235c
SHA512cd3c7ab16aac3aecd60b7dbd0777c4ee8270bd7716c5e8042bf0f1af0c3afdf351ef7ed70e09a119f9d64951a06c23290e7e6e6141710034f15a0446c466b50c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52309ffbc094afe1ef5e19d8bc0608207
SHA1f4298636187f255a068596e541f5cc26d67be6e2
SHA25649cf41a95f6c461fb541067b39369bebb02fafd981bb4cf6d144b66c6cfa5ce9
SHA512358e3ef741178105975065a0c8db9fabe17ca527e95225a2aa7764fd7167bcd5a05f7f7069cd43f72b86720f64410d2230e86a8e30987ba52f10c6b44c164676
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55754dfe6098aab330e070f7560cb4efa
SHA18af252ee3ce0f418235c62bd91da747b021871e2
SHA256556eb3bf2d2238f0712abedf260faa74514bc610cca7e563f22e83cb1983f5a6
SHA5128ada12151e02409b03786c5c8e3137424692aad3bb2a8633fe434165b897976a55c09e9147c3e94c482e504d0d546f855563274eb1ead99146379cc3db35b860
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54063b77dcc7c5219fedf54d0f394286b
SHA192920c37431e5373faf97f139cb83938b12b72d5
SHA256829feeeb7a797d35b308f54a0fb93e0f792e58a976c96fc648551f3d351e5033
SHA512cce6e6b63d4ce3dcfc6231a4c4be700e61bf9a7eed785386dbb428809440488ced6ff6d92845e67dc8ae14643715cd2d8843256fc09483640283dd32fc4c3b93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD53df03c10cfa7bac85ef4a3e25a2cadbd
SHA1870b65042504c5cfe9f94e6e866a1fcdf62753fa
SHA2565332a510eb371c89abdf3f8d0b9e9571f03f2b94174a30a48a21247e5db89313
SHA512a3df1d6a03440c30b8841d81410147f4b28d0a73f466e376e5361baec7d93be3e9cd6ef1408d239f3264f21f39c65e07c655e2221dfb1f5de6a4e9123fdab56d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5202e8d19e08c134f008158a10f6e6e67
SHA1dac586bc8790ba037e959a41c4082a78683447a2
SHA256ef00a14f7e3ccde4ed00259b2ff11df0161c79668b49e2a58b90b8f4b4ea12f1
SHA51268e0985b1ddf248cd7421ce4bf4150476bbd1588db21cebd167202958df7661274fa4d2327c49e6d5e1542249d154fe4486c0e90a71c682d647ac3f2ffce3c9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD544d96a5ae23a4cb4c577170543c971e8
SHA1d55dda2e617c7aa62ddb692e64ed6905fbad7fae
SHA2565b64b0053fbcb8744b53140220cb34b70b09a66b7c4d85f8bcbaa265b75f44fa
SHA51296683f1bfc4aac92eb4b43587510b0dbd2df790ad18211c1c523db773c38f038f1c21e5725d15acab0bfe23993ad82f0e59e36368bb27af298f46ec57d42d8e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cb3721a9fd0c6477ca6c5226f3000475
SHA125caf460182b5e53660a2d28498d8bc31386dbb0
SHA256691c7f63c730d17b422c0067fb543d2259d18d900c7f5ab374a0a8096acf997e
SHA512a4e262ff4e5e1eaab9d09ff139d3c303f17eec910352285452b4aedafca90c8e87a4d16624e9c3f20911bd5f6965070bd4098a1da6a9b811268c9ad7273b7096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b6ea0e5ff501e548d890b0284f18cf2d
SHA172da4bf74508b7906fac751234af8f3fb6c6c3b1
SHA256ba3846af1de77dcf5a40fb3ff9bc4a1b6ab0b23c99bf6438b7df8419449b59d8
SHA512b894a512c1460c80747e0237026d83f85ce85aab5482dba16bd9625ce61d618c68e54b920287919c9e0cdede340ba5c1bb93237e10d8576062d7702251e4520a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD599c0c8eed00b9da54c6ed1014e5518ec
SHA11bc8570d243fb7c480c93cf8cec1e91177432ae0
SHA2565899b7c06c70cd0a98d7f5aef10e5c1fcf615ba7b810bcf1f08186991b0f2252
SHA512cb238bdda7b4074704785c338210cffe1d0808b879871c1b687c994e770522b6efd5775a2530dbd177587a25b2a521e932f3ca0e92cfde62e50f8ae209af910f
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a