Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
878b89560483e574aa869c5ffdb9a96a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
878b89560483e574aa869c5ffdb9a96a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
878b89560483e574aa869c5ffdb9a96a_JaffaCakes118.html
-
Size
6KB
-
MD5
878b89560483e574aa869c5ffdb9a96a
-
SHA1
1e75e0727b3e6994d9bcf2e1ef74b7816ef4d588
-
SHA256
95608f3203c840f6ae9ab2a83a5d97f0c588da27cd7ba5d429daceb8fc485f41
-
SHA512
3ae608cb6ef4540cd92a936cf9af2e54e9f32b01571dcb69c34b33d89ea02053c88beacc6b612cd8d0d1a67e6d62bba2c6431f6783dff54f57548087ebccefac
-
SSDEEP
96:+IVub4Tsuxe5nLlQ63wZUWRwHW1ugm9BI/M69jPUwp9v+/DLp:+Isbyo5hQiPWRw2lm9BI/M6hPUwPS
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DEFE9941-1F65-11EF-91D8-D6B84878A518} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423332653" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 108582b372b3da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000bf87528e6caed932c5653ea1b1c7fe41fbb14ecfa084b2f22742d92ffe237194000000000e80000000020000200000005cd75270820816b7942eba69f8c29102d417b500fdcf315eb541c019fee418bc2000000002b140f0720a1f7119bd52d066478f735ff1296b8304cdd09c15c6659b2fe1fb400000009eeffc73383c3238143e3e75c80797e8944eb046ca120cc72691c618286b4df334b61358b8baea10d6fe7f8084660c70d4cac9f5f53aeca4624604261d3a4489 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1792 iexplore.exe 1792 iexplore.exe 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE 2440 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2440 1792 iexplore.exe 28 PID 1792 wrote to memory of 2440 1792 iexplore.exe 28 PID 1792 wrote to memory of 2440 1792 iexplore.exe 28 PID 1792 wrote to memory of 2440 1792 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\878b89560483e574aa869c5ffdb9a96a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1792 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b33296610cd7f58b614fd1756b9e1a62
SHA124a17c474d58ecd5830685dc22634c956faf232a
SHA256bcc143d133e905d21303d8687e1fbccb8cd017b2df6c83e686c831750d1b3db9
SHA512a18e577f23dd58f4fc46e06f0dc04541fbd8bbea31ea87f0b9e94ae01730d62506453daf01a777bad2ba4c91273fd4c5b0855c2e9708c6dbcc1696a3c1e6d3cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5389a4e6073140b9f04a459da1663280f
SHA19ee213114949b014a6b99698c373b440552f9f5e
SHA256cbd928f176069b7bd54947832f83c9993d741e2f9933cf4bb64bc7ea1c0cdcc6
SHA512e719b2e82fb68b1c1a1871fbe3fa82524e0f131ea72db6e47459ac20688a72c4100d13c29835cbf05a0e7338f329d69919e769b061ff6e00c4a6df86ca131334
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d4d5206e9edffc36e5e259b4160df82
SHA17355ebc91c54c7f07d287e1fb4a222b95c8560a1
SHA25621b2d1504f9df3e053e3c32feb9c1133c19e7ced18968d8bc3304d031fc4f38e
SHA5125fd03068b6ab1093291871997aa0e6c56fa87accf268c6274b87f08476f3013640b97a6343def820b83a0c4ddeecd35eebd41684863a75c393dcd9da6d1b7120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50d3433af65f9fca4cdb9e3f122ec071a
SHA16e0faad1195e1aaf36b934460d17f30f8af90a50
SHA2568f4191bcc0c77442f5712af8b1526190e9ce5491022a00c46e84181f3ba476d9
SHA512055c61fae9420378e51a0fa562fbc48de35806b657072f8a8515785cfb1cae3e6e02e9b31ef01412b31afddbfd8ad330fc2b990f8dcc7ef25f51e0666dd0a38e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bc8b5533271fcee7da7c67bb3ff7865
SHA14b1f2b2c693462c822c96deab3895f0c68945900
SHA2563df6c02f6c8e8c4471412a76ba6c12d3a940b3a8bb61e5d788759341a7e3bb7d
SHA512e7094ed55ee81664b37ea8dd91870a8b74173bcef39e49fb8c3ba7c1caf332459ab44beaf6b057af5185bc7ecc10a9e338ac07fd896f5f33df3f1c4aa1fe8d19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c68163ac8a85de04a56620d66241b88
SHA17d2aa33770ac268c129c5d1b6374067ef0050837
SHA256611515edcdfba15bb88398cc0fd177fc54ff986f9c11cfeeb7330d358419f3e9
SHA51266256bdf79e8e60c3195a97b71601328113ce7aa30b1b841d7c25a59efaf2f255b14aff3ffba630ba0e904e8011573c8af412cd9c78a35e63232044ff589a3fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515704e025163e6bdf1ffa894463b5280
SHA1139a78e9a04c7c80915b706bc85babf3ca5eae54
SHA256385baef9ea8dd6ddea14d950b5cad3db35642916e1541afa66cfefba5258500a
SHA512f433d538dc39802720529eca4647f74bb3601cb80fb1aef7b0bb0b797a0ae0cb3aedbdfb43fcbe19ee5cb9d55d37e260a92ebca4782168325ec527c467771649
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534de1d353a6093f912adcd179cb1003f
SHA14796ea84b69c54eabc14696a845ab67832aed96e
SHA256974a111bdb19fc4fcf8ce19d6a3f657bfe5522a89f43eafef42f8a123e18b439
SHA512113143f2722048c6e392bc6def7f3edf341cb8b67df85b222b6be9cc8d2f1e8b9d0be1ae1295448d5a4f68833f73840d0fc5986f3627e06afd39b30b7204a203
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51356fcc4b5c4dc6b0477937f9e4f0dd0
SHA1e57c5c25d466fe6e898079db7a9792af1e7b451c
SHA256cbc08f0160c9427db8ed4aeb95d9ba7da52e03f288ab71fb7061d18fcd94ee01
SHA512e8860dbbf34e110ee8f6572ab2fdd5af161152b129a875afc0efd43c8e3884b6f11e6a8137968c7fd9599b1e09ed78056b4668d982d1ebb0b30429557542614a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a50ac6d359a0e0088e70fb7e37b5e153
SHA18e7aa73593947080fc3830d60fc452af51e18cf1
SHA256b57285d33a872c3a97f35f4ca68e53ee1931f48c8b10f010cd1a16506d94fd92
SHA51208283adb7bf4c4365e5306e2207f96e444592d38df4906fb6ad0d82761accc126e865b6ac23ec942139518609da569d54ca3d8caa73e253b3db331bed114451c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1e7e6faec70b03fc8397942d33802ec
SHA1e2355725a026fcc67cfeada1bbf9b452e93ffe8a
SHA256e436f45799eb29da07927a2e160ed74a98574b657c1ae76c9f276429dd736fb1
SHA51215637a712112e6632b97c542b64abe584f1b4123dd608d7c7270f953ffc107d3f26a5b4a4b66bbd2c254ae94b009c8987e84f4c2b7a218f9e8dba4f97d017a74
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55af869f45338b7472db9b15a55df625f
SHA13da0045c4ab4e4d58c2d8a8563dc45e102c87079
SHA2563e17e4fbfcf05e2149a0435583f6fb472d0950c87c8aa315c5034673c843aec5
SHA512e0901c1df6c0bd8b61c1d91cccc451e65ea2010fca5b78fd68b4769a23a22412295afc858d14bdd21823c3b563890b4ec6fae5e9702d71d50d0b95fe089e7201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d0e2273830483bbe6c5965f610c2874
SHA1840a63d486593509f5228f931c836894c6f02719
SHA2569138a27261dc6d2dd1e9dfbee5f87d05b534e7d40679a02195ecd7722dbb0f90
SHA512601507f9f9fb2ae1d09c1148720e47ed78c9c027430ee46b4a1043e9da66916fb639e8446c40ca779e20b6efbba4464c9bf349c01b2b1c877b1a2c9f39a65ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589307fa591d81980bc06b498d425b207
SHA159c4ac59a842f535f14d81d5d09fc78fbbc52cd9
SHA2560c375027c665b698fd5a62d013f1ad76521c0a172344b9865192603e2a3d28f5
SHA51293d19b84f863c4bd0302adb6c709fc815cf5fd02385d29266e4e6c030f843e35ad00eb5c4fe39ab705ebcac3c38b4f85dbecd36c653d5cbf5c8e3af5e23e9834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c49c394b09329010c582a0e71870b87f
SHA19dbbfb5eb69d6aa35e2ec14c18ad119226de1158
SHA2566e060c4ae927e23c5a844e5f9d456250f8cbbe39c8436eef02819f97d7e40625
SHA512eb93231b1ab50ebf6826f862aab35ddfbcb3e7af65d7e9350a694bf8c7d0b8a6e041675bce752f1e260cbf1cdb72bdc4beddf3e8c327b5c1197439f66060440b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d2d22888327ac2898dd2e6f7e6536510
SHA19cc05957b802dfe48badcb4229054d8cbb05ead7
SHA256f3e89edc46375d0a5496e1b130b8cf3cf67e4636d77ab198350d5351201e6bd2
SHA51207c13c2580141b07e12ec75788395d2e95f06afefd384a5204167a67bfcd57019751831a676598d2eaab17b42c53960bee8247bd98e32e7e05d912fd9b17f2f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD545d3438c01e1f51407b17c0ed27a8e76
SHA1dd5e3c9d9e6254e4af5f5fc792fece07d3bd4b71
SHA2567b3b4f813f9986ab1fe05e6a8a51495763b7f820e611fce23552d7aa27e5459b
SHA5128fbc4add2b345c4aa106dcb7140682e756387726f5ef8b81d0be871f1add154a9e7c5052c54d0766f25f7bbcb060a3394991f9954df46a5edc1606f8fc8e78bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d4bb7fcb467d295ad737ca5c1bd3059
SHA152bbb57e4c545c3bc6d26e511798b32f35d0fb16
SHA25663edf792bbe4ce6e3301319ec2a250aea8f214d8c508b5f86c98bbd5995d2c95
SHA51238276d29d4c5b320ec9d09848137a6f60a9e32c12ed6b17072b6d3d3ed67432c5e1bf49a63b2fd9acb7a802fceba7ce7d81f801110180b713c85ec93ea4be9b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f22202b2c4840c4006c3d571ff2ef1
SHA189d9f1b3b8b471b32f9eebc125835905002dc7ea
SHA25634ef5ac519894d613bafb4b314e25bde28007d4fddea1068d211a6e9890ec177
SHA51217c8810ceee2f4a5f7f0bbb3b6f500940ee7a703c3723a82ee506d7dbaa48866e1c81d2e52611313ef19574ac45caa0c3ad6d13999d1ce66b20a6b5b269fdf83
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b