Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
949ceef5b28387514e7156f8801e693a_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
949ceef5b28387514e7156f8801e693a_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
949ceef5b28387514e7156f8801e693a_JaffaCakes118.html
-
Size
460KB
-
MD5
949ceef5b28387514e7156f8801e693a
-
SHA1
a431f3794a25956fa0f9f65e5a9b93fc712b24b3
-
SHA256
81a0380a369f499fd5185e37e5adb1795817df61d9037e8570bc7a7c00b2ce95
-
SHA512
b235f142818132ecb7e684102e8b9876051141a6e47563d222da73fd75170f07288b89f13719d35fd69c5f28d6ca621a3d1c6f3fa0ee921350dd54313a906a70
-
SSDEEP
6144:S0sMYod+X3oI+YsQIQBsMYod+X3oI+YCsMYod+X3oI+YLsMYod+X3oI+YQ:z5d+X3L5d+X3y5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423661261" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000bd2a7708e9798e4fa0b20f3efd8e936100000000020000000000106600000001000020000000eabda2dd6314746ba91d1442397dbaaca6d39c27e964e57716711dcf202e056a000000000e8000000002000020000000791c0f032f3f242da26f30edd9f556c1144936b225059448501501be184aa99b20000000ee6cf506d17229e8779e5d5ccd72d853e608c7f4726560f9794c73a9909ae49c400000001de2fa37ea028944cdc6046cee1d042f2c1bf595d3bdc2f1cfa91d91d501556386e8afb5c75dff3e0dd8aa1e0de19a30251359fae07b2a1bb592e271aef6d209 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00e80cd16fb6da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8840DF1-2262-11EF-A585-5A451966104F} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 340 iexplore.exe 340 iexplore.exe 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE 2972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 340 wrote to memory of 2972 340 iexplore.exe 28 PID 340 wrote to memory of 2972 340 iexplore.exe 28 PID 340 wrote to memory of 2972 340 iexplore.exe 28 PID 340 wrote to memory of 2972 340 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\949ceef5b28387514e7156f8801e693a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c051c4e520a0357f9095405e037ec86
SHA17a3ce554c77468ab21aa84b4e464da5470f4348e
SHA256029a1ec96a588681e1648201a956f0ebf79100492a125943137c7d769ffcd6bc
SHA512f740e907ccde1e76cc7b11c06f6861e227c93045f645c8f93ce5824a28d60c97c65d2495f698d179979f32c56249420b14823b2774a8943f99ad39c7cc39d40e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec11e1592f86e4c057ee876ad69bff27
SHA133fbbed18be39e10b0c502db1d1f890c3eaf4755
SHA256253fd64238ec677437687347f76465157a6f0477a96573bc97004bdf2523400d
SHA512f8c4e328d9f1da503d76e6f19cf0147ccccdb7847f20fad9666928cd794f443a4e30b912ab615ad0176dad7e092a0276062fddf7c79f28381358c6fd8378e3bc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52358147125595ba769abf31868bec7fb
SHA15cd6dcf3dc91f6686b3c2fa9a5327ad2118573d8
SHA2560d3e4620258ecf28da360744c2f79bf4739c2865ebfa2b2c09631f52ab2fcbad
SHA51270d8a73d404e020a6979df59e274c6a747c99cff574df22d38f901faf294159988f30d328b25ebc2438e7f780ac538b839604366a28d9fa376d86aab1eb744a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51297dc77e734cfcd63455cc0abf1b0e0
SHA1a86e2080f9dd91ffe7e2d0b7dd54c371486b36e5
SHA2565edff17393d6263ccd1a956492dcb733db5d5cc6ccb97422f3c777d40aa0f827
SHA5124c9126280dd4ccdac521432b41cbec20f8fa11a8ff3c401104372b5699afadd6afcf545aa0f0f3ca982f87f8a0261a8b2bd1f5a41c6af7d6793df83070126828
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5167f20c90416e13716e52510dc13041a
SHA1ca70fc9d2dca3843decf93bd1062fdf6164f40b7
SHA25614c722593a41b58590a6ddf20e9807284de7d1491a4b23d66399fd01b2714ab1
SHA51216b8a8911cdd318ff2142ffe66b21a617d8364c79862ca7eabdc25711da7f17e104792f3c2cedf915b7c5303c4ca6bce015e90de45254a97ad3ba3c070a631aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53256d94780f01ad6d814c8be85402bfb
SHA159a5842f143122533f70d652ec33716c7dd4a482
SHA256095e1804ea4c9168e50b8683e835270c84e3aac85d0d1e38cc1891b364cfa8f2
SHA51226f39881d5742163c0e38987dd20e0f8ca447d8bd02e71fdafbcc29f9ead665787f8aab4b4b5b49bbea30115bacb94f1eb87a1936bd57798bd7d037f12fecdba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50245e2ce5d2d5515da9df711a429d0e8
SHA11115937e0d24d0f3ef6247431c48fabdae6dcd47
SHA256fced5a69e40172b5f24a3c5c2b43ae07e30954206577b9d4d45f9c4422769ac8
SHA51278a9f3f86187c029dd768c8fdaf7a138979cd56d5b31aaa5d3872224b5b2893bf88a96d8f3fa2b3554e9e56d935488668759e35ccd295c2b7378117b19d5b539
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc44fae283ee4f98ec7e5bbd2c9b0570
SHA1e6b70b74caf764648b079f0bcb2263190f356db1
SHA25656e6d8112489d3eb3e9d56cca6b7d2164985b3a1d0742a6298e57ece55c160d2
SHA51214b88190d60e464f3018d4399d40f9d607836d454432dc26efd3c25e1e6555f5f63e34705adb7071fc2dbdcfcf4c84973ddae65110e89d07b96470fb76d6564e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505eabfb5cea15e0c359a57c9109bd3d9
SHA1664319d78930b03346aa019ebb425f5fb1ba0918
SHA2562f1f0243f9aa2ca6210d40851c0db71740b26adefcc2a3c868af1a93b89db59e
SHA51214b25d5637d6fde78a23a7f51ff540b22849651591c24c6d9b352d9e9a1bdc7968dc0938237c25437b4af96f4f88af9375e07adfd4c5ebc9e5e1f06bf2b39bb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50ef5a4a342ae425d82d6f98dbe229acd
SHA14d52e1af57f92c169f13466aa1ca960fe4319293
SHA25633854f6a11ae055cfd2f26583420a996356cb89dd9b69e43167da69657a027d6
SHA512342b46ab69d6cc6c69a5e8a086188236e867e9384e4c121969f3493bdfe4ad7e24191e904c82b86c61212fe65760850b52c47979602f50d0fa070ffe13eb1072
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552e4560814cdbf3427d21a364d3651d5
SHA1f8c7bda6dcb1f1429dd08a1bb47785000bd717f3
SHA25654318b055cd84536cc981a35fe7ff2253ed1384c28db0b8386c58df31db7210c
SHA5128dd10614096a7d335f805a6155481a9ad2b60456e5ca708a9c2e75c3ae31c192f6761451f63a69c1c63bcd74fc4691eeaa21c46f049ef2e91fa932b55739ab50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50297343660ce7d0d8b228f1e1ce3a76f
SHA16674f58417c8c6378c97f65285d5639032334e68
SHA256ee6a35141db8d68de3e3dfa387411fb5f3c472f48c0eb4543ade4010de968400
SHA5127e7b4879c7c99f33b9d3f9f2447aa754a613d29db5a1e63d616de885ac5c7793cc5842ab59b9a065b16744be05f2c4a7e06621790fe96e3ac1483460f4e1daab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5617dab28e8fc6afd997fc192573433fe
SHA103ad4ddd566075662010917fbc68031ade8e6a9d
SHA25642c771122b611617e6f1487474a733da28174ff505c09f456204f77bbc5f4448
SHA5125687169a0a3b066dc504ef1a42b8ca17fe535367c0e27af9bd906a99d20b5155e93e076e6494c37c24ff7f64e806dad1e8f614ee151ae1a3fabdd77d0710b7c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD584419558d7016987d11be0cd3afc70b0
SHA18c7b550ad6587d5f26f796135119a554aa4d7c11
SHA2569e4be0982b3ecfaea3db7e01a286d9490696af52fadc9f90ff55995c174dd76b
SHA51296abba9fd14e270bc86b2b3164ae6261871acb856811f956540336f2560fa0ee3feb84b34402d631e0a23025e328e81f4b29bd6e881dad41147642dcf14eb2a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD559e69a9c43cf7cc013f690a909c1b4fe
SHA14e9488b69db7c0869b341f46a6285e99ada09cf2
SHA2566f087b7b299fb03040b2e0f5580f88971cff52891bb607cbbb000fbe77771c57
SHA512ef8ae0d491c838e708a47de0346b67dd74ce591b0a1758e805f7a3c4ede54d34df4cc1d88cc6bb9a2f5e70a37365bd8c81f975bb9b8a52b2090f985853a0c567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518dfd89199af2657457c7156a15d548c
SHA1d86f86d3259a0f43d0633cf5da20ac5176345588
SHA256bc57e48badff9242b79b36b723f91f7944a836e05e78ba3f3f9d52650b4cb7eb
SHA51296ef4e73457a788c035f76274aedd866313f4c569d6fbdf0cbd7d2bdfe01dd35146c0dd3b98761ef9396fcfae1e031e825d521ba4053d558798e4589063a7e72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b9cf8ac305fe3af66dd898e2cda2cce2
SHA19911a1c07917660a0d65f4ec6c191cbb515c1ffd
SHA25672271a253756b4e4722f3abde24fc123f62301f5ef24ab017e5d31a9828d8fb5
SHA51264555eb599d6f5fca54fe007270675d4a996b9306de08ebd658d4a0945b16f74ac7a807da9fec8ea800acc5a214aa96750b2421e1927af32001bbc5782dcc00a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ab767a6d21a704edb1733c53410b0eb
SHA1689b33c511cf07677a9bcac7898a44b1e3819251
SHA2562692de8c55edb250f0516e7708f64a5a1c23fbb9269751b73f3c006688b98dcc
SHA512add2bbf95e0681cc519cab77a7bb456d1ff70df7a2ef0b0bdb0bb9dfbb0346f41df9fe8dcce0e28d764c8acda04acf8a852a090984670eef3758eed86714df9b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe099ee5ac7243721fe0fea24b81a511
SHA1f3012116d4c42a106c701dd5347e368dd98ea1eb
SHA2561ee1d24277d6b9c7f249f9692855266987b4b7a64fc86a055eb8567fcef18c75
SHA5121a96ede5d644d96d92e875594475f6be4a4498245a4e927cccec6c2de6d2b8bb1e27b3def946f622e5be0e04386e7f67d3ef65d40b58677876b71b35a3cf8de9
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b