Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 22:56
Static task
static1
Behavioral task
behavioral1
Sample
a2cf8afe66aef30f21d332362a9485ba_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a2cf8afe66aef30f21d332362a9485ba_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a2cf8afe66aef30f21d332362a9485ba_JaffaCakes118.html
-
Size
466KB
-
MD5
a2cf8afe66aef30f21d332362a9485ba
-
SHA1
5259ee0a2365a47b9ed74c6e85166d2f6cb7dd47
-
SHA256
4bdefd642ea167cb8c63414c3566556a48260c09959f40fac6e7a34eeb4b2329
-
SHA512
65475ce7039f08f86d0c27d278317985b0b4cddc97d30f56f8ece7e64bd26aae3018db9c550e617e270596b9b69519374742d78d825f06545dfff93ffec8ab75
-
SSDEEP
6144:3sMYod+X3oI+YtsMYod+X3oI+Yu5ksMYod+X3oI+YMsMYod+X3oI+YQ:b5d+X3z5d+X3yy5d+X3g5d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424394873" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000064a60db98d9d925f1d33ded9e7af83fbe648fb0234c3715fb1949069f1cc5bba000000000e80000000020000200000006feaab5726509e0c7bffc73dcdbc23da78cb240888cd95d995491d0615c9a611200000001d472100cb83ef36e07bc2cb0b7e659647a9110587dcb15f57422a1e7a2282a240000000bacd5eb708870349683c2aa7cf8b8c594725c7dce3803e52de902813ddc085ce45eceda1d4579c3558a275666ae3a9a5e4ac1e51009b05edf3e7092ab0a730f6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0d4111e1cbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0ABE59F1-290F-11EF-9DC1-C63262D56B5F} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1804 iexplore.exe 1804 iexplore.exe 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE 2968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2968 1804 iexplore.exe 28 PID 1804 wrote to memory of 2968 1804 iexplore.exe 28 PID 1804 wrote to memory of 2968 1804 iexplore.exe 28 PID 1804 wrote to memory of 2968 1804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2cf8afe66aef30f21d332362a9485ba_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57afb5510c7c2efc0901a6fcf9a477ecf
SHA103d8df4eff05a0113a18980bfb25dedc7f265288
SHA2568dab1e915756b234398f8351fe9d5acd7914812d4f7ea9340c89c871e6a38848
SHA5125fb01eb8c6d63efe94d9e5b06300be45218530d4af5af2b84a60ee5045e4a32e8383f6508a4a397dbccf5f1e7d58f2e29a005a83571bfcd7addf72016b13eca4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e0e3ab271da96cd92ce7f9c1e7341eb
SHA17dd764fcf6854c84d700a158156a14bd67174512
SHA256d35f8bc63434b8fe4fa612669cc11996b383f28ba59aee2c45a74ce749f154e2
SHA5129b96666184fa10938072054569173b6fbba5997bb1a9aca5b228a83e8c5c0466879e83c5b65333f237d85222c0a768febff828a1bb153d9d4db63f6d12d375fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4a01f20eee1afe96f9f55afdc827653
SHA1bee6f1a43cf9dbbcc1521545e0c80909273011d9
SHA256613565b436e05dea46852dd27b4024dd8b59f08189079ecbc060c6dee9bc4bc9
SHA512d24fc98b7077dd6461095965c655f48f03a36c4803eae9bbd089cf48efca71ea23d368976977b53d6c14dd5754eb5cc8c7553480379f1ffa5e8e7a229a956969
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589582d7de8871e5df5c76fcb22de55c9
SHA1d9b15d8ba0f389bfa9285016056f1802bdb70650
SHA25604cd27fa0e4d163819b04383776c293b263363dd68428b13d4478d27a7017df6
SHA512213279c190447d4734b8981cf59ff43d75bc17b17c3b9ca44741ec22c4c87e1b16cb359d4d48e75036e316a1fbe2a25283ad1c093563f26f4f23c625c63ef599
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5386bc60a0f37227f1e8e8a649d283e84
SHA148950b2bdcc195375af6017659e2c4731780be80
SHA2561937c65f3e6d3e6e226f0c61f6a4a1fa632c40e0b8701de91027f270bca26889
SHA51259115cbe3bb208e7e77b848933ca210df1e48ce68baae14df6b79ce4ccd2e8abdd514b21f831b454c89fed17b222ff1a2e74cdfe7c0f4070e8156aebee01fc17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b83fda384849ecf0db5b10481a3c0e0
SHA1bdccab0dd617a0409775ffb3aa01f8658caeaa32
SHA256509d842dcff2643d324158dc3989e9510c911a54af394adddb9701dd7f58162f
SHA5128d3dc8ec60b22b489033796bed124aa1a8d4b15c52cf6904f62635935d1c547f7ebd362c6b5969c322fa8900bccfb18dedba8bc5016e8a1e90d8dae911192fb5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5005ceb93a521d89a5f4d3e2046eade6b
SHA1518d850d76923d2d9c62e484fe351fc50ed17acf
SHA256cdfcd844b6e2f8a5fb2959df1d68081b2b1bcb685e2207fa7f6f62c3cef60512
SHA512053cb625537fa783b8943a5b56ff483b5ffa177ba238466b9c8c4fa4175e53239875cce0dfaee72d74cd8eec61c8b8d50bdae426bca2519e739cb6b679c4ba0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff7da3ec32cc1ea2c284300746a8f0c3
SHA12f80ec1d5a22af64959bb365017bb125d72d706f
SHA256182b8f65c6a750443f6ac9010725b96ce53c20ede4a9519fa9e181fe05c35d9a
SHA512013cdc4a86847ac26451bd55aea19cdbace8d5f38d068fa7580727454c721af42ddb2f2e2d2b7032496957b386eca93687145d8903bfb3ee0459770d1f49e178
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50fd8e0808c12bd198b327843f28fba4d
SHA1e984be20bbab7d6ae69ebc0096e0c7b351e1b100
SHA25620222856b5eedd8f3203a342a4b8000227ca89ec6d8d5bfa78e55debdfccd01d
SHA5128f662523e5b766997e867679b92c07ce0df2cb8be2097ddff43a6a10b45d6b6be86cf04f4f943dc3d2fd581a3ee473cd73845dd94587745efb9e24e867124aea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba1067581a32c7c663aab4d8b1debfb4
SHA18beecefc2d3e93cbe248b0c0b6003f50b9b23ef3
SHA256e688f14cd2de3134ad65008701e8b68794edab8ee1243ee98f0bbabb35c944c9
SHA512ae3ec087dbfb944c242c837a7799207cee433b11077f7ee840f0dc4b1605e9da532f1b083df4deaf311ccc415de8b619da63db2e3dc1ffc9f332ba92dd7350b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5081da57994730b164dab242acc22ae4b
SHA101f39aa56e1134c52f2712e861c281992c66ae6c
SHA2560fa748089a64f0a7ffe777f1950576794c251b20023517c5372a66e77a64cdaa
SHA512d22699a5b9e0fb8727c7ecd81f28fbd0c88d69fb06554df9e03ee40e17c635424fe2881b5751e0603ed048a9aedb2edd5628ddbf3ad915a1277716106e3d636a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5febb89ffcafabf1dfa3a7df18e7f36da
SHA18a487e92e6dde3ebcf67359ab5b40345408d6b1f
SHA2567ec8b759bfed317b56288764559f05f7ce11c32da0d01b423990de2f13ae8dcc
SHA512df6187f8bae7b3ad1e64efee758b5777ec4d0557fa51ea759019a5b43dcfed17459b67d4956a583235821fd28f64bd0387d52a3fc234d5d67ac761bdaec3e3e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5562da35fe3ff48d486d0197978e8bbc0
SHA1f5430644e229cb92019c0c1f52ef3435095f9355
SHA256ba88ea4ed0a1dd50600ab6fb1ea7f09cb42855d38013b3872a7306005d665034
SHA5121af2beaf3e4ac47d2e52e6080b0224332bec4a77a515d0d206b112cc326441f84860dc6de2aa8908279e9fed202f4fa261c8c46ecd5b97d8b39ca7242f242ba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD565aa5641dd255dd605d6e47fc83be429
SHA147946e91dc9db57be32cf995f322ebac10e91046
SHA256f50737f3454fc479e75529c8d717a00db8edf8e71a57f7e07facfc60b6ad1ced
SHA512bc5aab9fe5e027b7610a533e064037548e0bb2a0d91c72a90ce34f9877ed9d18cd50b8bf266516e436618ba32759024eb64eb497fa1c55cae89b9976171c418c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5030b5e7b2481a516d7ae0bfd60659d99
SHA1de7cf0bd6c8cf7203776e8f6de9f36ad140cbac2
SHA256106a690f8416bddcc6135f169ab7764cb6f078c1619d665bf2bff1f61aef1ef2
SHA512d5c368c127a1fe7f9e939b4c4fc7b318929d82147cf913bb01a183118bc23fd737b290b148b31e4589a6e2dc2ef2b849bbb7d97369a1cf1ec3d185380df5afc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a1a18da6bc629fd1b3dbe0b3bc7f4f7d
SHA1347a0729f43f3312b50f887f5549adf6f9d6e544
SHA256060b359dbabc8fe070faecedc447dbe482546aa4813ccd9d4495bf30e256eade
SHA5120469a914cb6efd470ede8d60cc4b834984710377ee3620c3cc1e761c967039b1961d49310c37150d9ff795205a9b06b39a20210fb173c7da550a103bd853c96c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b9ae386781057a0ea4ec243f9f32706
SHA1f3af038dbaca4fd9747fa17d501c0884fdd82a66
SHA256cfaec227f9c0b62b4fe79cf37b3c7abc0d0c752c1d8ecd4b164c91c3dd3a774b
SHA5127398ae5ac3ddfcedca86e69a83d110e9ec09a3bd2d65f2aa176e01a406680335a2434187e243e3fd232806ed39e78e74b1c646a2405c44fb819ac5bf4d2567ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5973ad259fa4037c56d02739bb9fea25f
SHA1b253d91990061c13f255b00ea5baa7642f4c863e
SHA2569afc84fd3e09e8258a2bbbd4503382d814e3e61d5054a75c796b9c11214478b6
SHA51287bea3f8b6d2d4808711d474acf2213cd20edd30c4e7c3666a1e83da6cadee7b8e244519ebcbf7446a5f3f24d1c8253abac0ce57ad35bb6e34feb31c28232dd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD539fe105e08f8d95d1d931cada679cf8c
SHA1e6b08a85354754841a06d63932e2f5a73e015706
SHA256211f73523d0c794374bd6f060b68c0ffe452a0039c33eacbc3b14aa4560c4318
SHA5123f57d6f2147dc29ad14bffa3184619e5a04d617a79dc95bb4058d7d2503d7d8e3f275d9d808e921b4399a77df73f85aa0a60b327294f446e6f0b76cae1f91055
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M0DW1CQS\201809291538191533[1].htm
Filesize428B
MD5453092f235dce52212c4b8cf4cca3e14
SHA1ac0667f9388845dee20070d1e84c24c79bb7425c
SHA256858e5c923b07edbc5b3721c589e02028fc2b7198f7c8d07623358677bf25c43f
SHA51251324bce7a0e882d71f250d750b83a17f77ad6123d7e930eb7377bfde6017a3fa637b3d1906c56c1ff79fca05a77693111dd5b697c76d5f2b360356e226c74fc
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b