Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29-05-2024 04:45
Static task
static1
Behavioral task
behavioral1
Sample
7f875230a1e1ed5a8f2a25f6e50490da_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
7f875230a1e1ed5a8f2a25f6e50490da_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
7f875230a1e1ed5a8f2a25f6e50490da_JaffaCakes118.html
-
Size
461KB
-
MD5
7f875230a1e1ed5a8f2a25f6e50490da
-
SHA1
027d1573600648dfa8bd0eafa63018137492f53c
-
SHA256
cabf2e66b5054f2bc161214ad74764a9d56615981292af83c191df94b3975ee7
-
SHA512
2becfb3e4f8859ca8f26b4200ad7230153c8ffaba78c1666f1e1506f001102d8e7f3b289fbf09b21205b658f2f08e20676ccf70d621b0cc43a07d069f7c5bcb2
-
SSDEEP
6144:SRsMYod+X3oI+YkQGsMYod+X3oI+YtsMYod+X3oI+YLsMYod+X3oI+YQ:A5d+X365d+X3X5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 70fa802683b1da01 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4DFAC041-1D76-11EF-9A72-56DE4A60B18F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003ba99dbaab22a04382c4e9727d0820b500000000020000000000106600000001000020000000f248d5b9f1827cc1ccfd48b5cc697b377c49682502060a9cdff4c78e44437728000000000e8000000002000020000000c2a4946ea4546a2f1e88878f2d59b0f268e4b8eccbf18be5c4dcc29fd432a7fc20000000b7fa9b09d3cb8bfe1f031218fa61d51e76bc8a4f3ec6496db63e76751bc81a8f400000007b76da8c71aa5837d9f6c34b65a2a036828279869497cca6fa2350ce0146d7697e598d99ebccad5104d366055e997fa5888a700e418c4865832810e962aae4c8 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423119810" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2192 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2192 iexplore.exe 2192 iexplore.exe 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE 2744 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2744 2192 iexplore.exe 28 PID 2192 wrote to memory of 2744 2192 iexplore.exe 28 PID 2192 wrote to memory of 2744 2192 iexplore.exe 28 PID 2192 wrote to memory of 2744 2192 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7f875230a1e1ed5a8f2a25f6e50490da_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2192 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b4834388ad8abeb253b767d78a80deb
SHA1af80ee71ed66eab90fe416037e068740f9ba24b2
SHA2565f9dbeac3831a74861992f23aca89a6e092a33c8875f55a6d2258910dfb5b2be
SHA51258a713b752b4f4d4ef0aa8b8e3e2533d54beb1d1e6bd3a3001654843e357e691ffbcd3ce974261f8ab4e2421b054b51c86aabd5205726f99eca6d5f238c9fb9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54cd736671f96bf7ae040400624a903da
SHA1c060fcc1f9480464dc0f20613039db164f1f4157
SHA256336258c37bee7d9918af1c98c1d64a943ee0aab6accb5825a086a1ef507c279c
SHA512e041e5a4d6b887b0a3094c1f48a7d9a9721152729c7acaffeb7fbe2d600d2c38fece033bdcec3476b6ea52b10a35c606005880b60be7d17907324565760f9fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ab845b87b0cd935efac58830bd5537c
SHA10eedd51c3f73fa66e996436d5c0371acdebfd536
SHA256c959382a46dcd7a5e439b245b997bb5c03ec9f134c2e53da450b483c712eb402
SHA5128d6bf91e7a1bd6b58301472214cec2f8dca9566898af5777f79ead70dba03dc78a00febc4e41f9356096255466baa032c617d8da78ab15a6a2076d646b7caaaf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e9b14a2fe2e23db8a02806f89c372a
SHA1835ce717e7743d23a3a68ab2943a0b6b158ee004
SHA256b288131e086758b34f6ff8c098b710058a5d9c6328427c7e1b82e0c91cd4fc6c
SHA51246e035f6725984e78221e48987bc7238cd4032c6f558ef0645bb6e57d3847630a6ec21b10bc7bec206acfd55ee7f51f9d68aefea6ae9aa528200ccdf9cd8e515
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508207aba29844d12b5431f226692589a
SHA139e1168d76281d90e118848d3cdca801407c52a2
SHA2564a7944faf8c62e519b5cb55ad758a2c2172308469edcc90b7de98d396627f196
SHA5125d4565e3938b4dd64eecbf4a2e6e507ca70a2c37cf1bc38a45457b2f25e3595771e1a604769a4d7f1e45dfb8efd72910dfa52b35272a3d6e1146c50ee21c0646
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2eb9fa2f1c7c8dc577c07fccf0effa9
SHA1c9d285a663555f194f1ea2440da6d945e83b5ceb
SHA256607cbc2c004924996ea40b179cdf80bff9e5f12465fe88e28e6dfb775ddc061f
SHA51235a8ab17819deed9d7776b7a67ff8ea01f57618fc3ebb9a3d25203d195d7abafda69bc417e23bc232beaa24a4e5adaee726bed00e829e494a0fd12a89604e3f1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588dacba94ff8ed1e39c9f9ef2e6cd227
SHA139c2660eb118460c8f2fb6caf3d57f0d8c364130
SHA2562abd028c6395d666bfc79861e17379d645689d4f98237ee32d6cc8cab0af979b
SHA5122436b82fdaed3478b51cde09d7f31651f61340f0ce6d7b65cf09bdfb262396cd4543a640124d69ba5108e5a57b742dd23bd4066bea907f06a0df176cd72e8c4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56cc9b29336105ddfc599102e2d524dfe
SHA1eab39623ff4e3e03ab3241575cdf9e80a94a9c9e
SHA256c1a2f2b4b313f8c875c9da039b08eedb78cebac424a185659031496c461f639e
SHA512a472b84a5c9c29beda1dcbf70b80b1e2beb293be50fdb1c4d0911071f951459c3e36cb5d65c63fe8a29f2ccf4e84fe45c765bcb6a5a56ec576923b2c3a050333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0193174c007efc4fdd85370ee87427
SHA15a37746621a3b0eb22c8c9d3f744b9cd1b9e6ed4
SHA25615191de47d77def720ab72ee3c8a17211284cb599daa973091202207423153dc
SHA5128ad1ebd610c301e98582b0e265d5a7700a8da30f2ec565cb21707b672b99eb2b21c2da7f51c5c8728a4f1f485cd64072cdb21ddbf44d485e88b521b9ea71ced3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a371d22cd0097b9fb4a97e81dbb24d53
SHA1aa12e7cbb7e517271785ab48991d448bfdcca80e
SHA256a86a6b18bc269db940c73b43f472474b8f78b5958c848a9ee21abb951c55f6c2
SHA512e30c14f2474f2f82474d8141300ecb5c4822b36cb7b7784b77f5e76307d3be50f50883d314d7c97e318e90c3236c29cd278a973dc6e503b000067bca25182d3b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fff1cfcfe6674904f0b144a3926533d0
SHA1ed4a0aac4a0cfb03ca8566d140f11afecccc0363
SHA256054bd9dd27aa8bac6d38944b0b23e0bbbf663badb62cbe4d6f4380686f611871
SHA5121f9070db6ec4f7a371e9fa2d9fe0a1421955e8a632156f16703c86e4e24ce11e8a030bc63851af37284af56b48fa2d37b6d542c10adaf18b6832f9c8fd9b152f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD590ed9fd6a116531919010fd3f8134ffb
SHA17383807b963b572ca6e97fc877049b55626ad0f6
SHA2563495a1c69e71351f2ead51c61a83e20fc7889c8a851e97be52ad7062820816bf
SHA512836048bf63da402af927aee66aa413d95a1c22ebd672158466fe05ec272d27b199babc18b7ccc12ba563b1a3a1fd90e40117c163e9d15627eadfb2d1dc7241b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55cb20dc7dcd32f3e07afa9082d72df6a
SHA16f845b39a3d765dd12b7d480ec555eebb6aa56ac
SHA2567c0171a7a63c7f5c5ba7f79bbd22ddc317f4869c167b83fb7508deb7c653df7c
SHA512290af898fea5b49267d8fff2c5446eddfc4944533911ba59baa211d2f03dc7dd05bd24151bd87d7533dc69e43d145b14bb79e5dcfd9c1462986bf451f41850a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b429caf41bb1741254e5e1062ee004e
SHA104a3b94b6c6dab11c5ed29508ea830933b91ed5e
SHA256ecd7f3e3d7e9d60947755f1a1835cc55b21fd362e6a5fdb0c29c7f9690f0c1a2
SHA512f2bf597a2cec343971a101565cc414ffc6df098ebb5b280552e9d528420106d5ef2433636e9d414a69b88326da53af43f03e67c21bbf45257dfe4c9846591527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568d05c00ba1f1b5df3e438b9cde88af5
SHA170ca270d5428d9ad14385d146b36ed92a5b721b8
SHA25675594626038751da4e14c15b63849845c94a1cde73c8b788ca62acb2d7a1b7b6
SHA51230408759b2c1b80805a008d147394a762cfd47aa0fda96855bd91a931489c7718b7a35ef370d8d407ffcf6f09ea4570329811e16453b09452f822a5e44c3bf4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f894610b626f0352a672ad5371594aa
SHA163390e66747b5bac0753ddd6ebe023edef1f744e
SHA25644f2f1efe60391c306a48ff3db5578067d7dcc6ed519e504c7cea974f4e419f1
SHA512e1333afce3dd899cafa226684aafc659e3cd4c235885c5fa61664a6ff5bfa72d04a3d11c0f6332f16124de89ea817dc54c1e34df9fbcd22cacb9c6c1c167aac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5077522c497ab2d8031ce46e44d9ea834
SHA136dfa326223ed9ee70210ced76fa34685154f8e4
SHA2565b900d89ea7cb12c4986368156dca5af9a9a3c858b1fc29bff6184e907ee009f
SHA5120dea57d31230359269f0132219d27c8527a2c8a0f2b0d2d56beb0529c53bcb758e66f2d24a6774bb71ca5d9a1eacce5bbdcfbb175eed7c04d185b0569590312e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5171ea20c6faa764d20c5439ae0c8b355
SHA15299a4fd4936344dff3cad0a4cbebd6138d9fff9
SHA256f31cd37bbb2e735d26e3cc6dfda1223b72a6d1ba9a6f96b7c639dd9c9a4d1c48
SHA512026bf051bae9b9b781796c56e108c4b3d4fbccc29f6bffec217dbdbe5104677cc8871851c221d4e99247dc03a7bc5472d30c1df6e31a153e310f81d9d3c79b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be1a71f793fe8d001e3f5a633ac6fe34
SHA17df2f1ca02f43016512ae8dcca0d3a0d7af11025
SHA2564c4dddb2a3756297f8801ad84a63f13fbc0b03b06468f8e1404ad864b1c169e8
SHA512a0fd3ce0bd3989d0ef81bacd967aa7c806ff35bd0a47ad949d3eb90f64ca1ddf2dd86604599228c5d449bb39a630d41d5c86f622c51c3391bb14f318de59e538
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b