Analysis
-
max time kernel
140s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
a2e4d9a47a54cfc805bb9d911d1cea97_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a2e4d9a47a54cfc805bb9d911d1cea97_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a2e4d9a47a54cfc805bb9d911d1cea97_JaffaCakes118.html
-
Size
63KB
-
MD5
a2e4d9a47a54cfc805bb9d911d1cea97
-
SHA1
d8dfbf3192e92aa7bd90e798ecb1cb439d36b618
-
SHA256
c5ecd29f7cc311dbd998f97899d645e133e9f46a3b7c6f9c1ddc78687556dc82
-
SHA512
987be1265c8840324cafe677c6ef57da1aa5fe6990bf2f2d6f1e410038d02da5b0ab30c6a8d256a890eb105e4ccccd8735b848679cd5b6266e287e26c9a437b1
-
SSDEEP
768:Ji/gcMiz3sI2PDDZf0glv89T8oTykyCZkoTnMdtbBnfBgN8/oi2c8QFVGys//IjC:J/+NTTFec0tbrgaMc7NndC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17FE8101-2912-11EF-B47E-DA79F2D4D836} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f02f2bed1ebdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000e2946fac12e66139bcea2fcd860b741d2fad11a0a08c36dc98b6a1c53e6d6687000000000e80000000020000200000000b5812e1f4c83614e02f6d899c38ba32c35cb91e77d833467d529d8faedd96e120000000cb85233fd2c78c2bb745a78126e928ba7cd155e02e1e14910a3c7d230bb5685540000000b05a94627916f8f111d021145d25e25189ba4a687915e52a3daa683d52ad743dfc71801b5d9bec83795d3fe9c2834464cfe02829c61f8cb31e260043a3be8a91 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424396186" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2420 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2420 iexplore.exe 2420 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2872 2420 iexplore.exe 28 PID 2420 wrote to memory of 2872 2420 iexplore.exe 28 PID 2420 wrote to memory of 2872 2420 iexplore.exe 28 PID 2420 wrote to memory of 2872 2420 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2e4d9a47a54cfc805bb9d911d1cea97_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2420 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1c871461784de0d7dea0addfe80b369
SHA11a01c046c25552714d19a22afec3949e25a7cc58
SHA256e2421943ed905167de94d82d00af8c60c2a403d8e82a29545d5c89e0233a62ef
SHA51211bffd81c6c7b95e11c7875b9489cf1f7f908a8aa4a55cc26e96aa7cdffba729df959ace9b30a2cfef535747411abee2a86c47ddd9119e53a71ef87f6524ebe7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a37c90b3a84ad876f680d336a2e6d4c
SHA198e9dbdf443a2721687acb8c2256dd298549349c
SHA2567cbf68f7aee587eede424cc02891642569a8559c3b302934df0788420e34c0f1
SHA512bb870b4ef492bba957c114f3a0d2784531e5f9f63ae428a9167545f6fbf1643199d6d8f4fabe8a98857bb6a376efbfb250233d94fe1dc00f263d94f8306f5a01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cae37c6de5270f3bf36b2e8ce7f976e6
SHA138f6c4a34c76bbebca700162d946bdd8abf012d6
SHA25613994b9c148db21ae54f23c36d917649d15348abd39801356acdb1d30e8bd54c
SHA5127a2a73cd4e8f65fb70e025619099e920eeb68cfb94a3263c7d6c337d27dbf3724add322bf51b70443488040d01afbbfc15eb794a931aa2194f45a14ef40543d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53cf6e7ea1b9ab1de1626bfeec23e7659
SHA1f31fe976620e86d19248066a7ea2df4fcb77c79a
SHA256405babe0292e6e8e84e82276945375b9e6fd02d09fc0b2f7c14cf18a2afb5f3a
SHA512bca5ba7336d22cbc15426e5c4d301f1f70358761f9c0d0fc451efc1fd07a699049f0f4651e6577c1773e0738a8093f433c03c35724d08a45d6f3d440c1e051db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58548f9001e0a32c41904ee84766fbda6
SHA1a4bd6c419bdb9186648d79287e1ddd367052b6c8
SHA256ac0d624fd3cd4a3651eb7814a0b947fffbb22c330ba5190b58f659df173fa2cc
SHA512b5810656b3e91940da5ad1beda055b877f39a34de755e2af10521b7e72369955475377c0633a9f5c9d691cabc229625e307f27cf309b01fd442331f2e9906328
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596e62db4e656e6bdac8232555a8c7b49
SHA1902729c600ae447bdc666db3ae68a591e3eff9a9
SHA256fe5a2f11999a746d497e22dca133e55bf5b92be63d7d3b02d1d7cf38d08e4f70
SHA512828e213585ab5b6cca52edd81972beaa4875f38c671284ddd8de9b82253550649a09c05a2a4d84b5dcc19a5939e098dfab4898587b47b44fe55674d4ce044df9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57472555278d25fe56963757c00b9f33a
SHA1cb86b4ec11adff0e05549a5861d15481bef5533a
SHA2565316c55c05bb1fc0dec22bce7d06e779113a85ce85d530047e4dd0dce2cd16b9
SHA512fb2f1e6ea32d1920cc4c15a2356aeb23bab74702fc639d379435e265c7d1617f19786f68bfefb1b87925aa46e71684de3ad5716f4b8239f9f7c70ad7871e1631
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5847685d5d0480f4908dd75f780aa56ba
SHA1a83a3b5e58c883c2242051a6843f9691decf87cc
SHA2564f6693d53b452b74b73e51ae5b2ee31deaf9588b908de1b051f60c1cf54531c1
SHA5120003ea0366c23e4d404f92505526347b407b6a04d4ec7fc6c9fc50cbe2decc15a2340aee1f8da5dbca048e550fb0a51e1901e344588454756ad3b0d0a5c7c51d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fbd2d7b3cb38b3e7927f07beb8baa049
SHA17b6ddeb36e856e7fe7892b42850a36f9b19a57c1
SHA256d66a4e4b4dd1aad8b930c613bcbe79acfdfce7e0e08d3b6d7f8837945ffa5928
SHA512416282b0e577dc0f3b75a20b1200450185e2e78221f1aed68f0230e6ab465d8704c607b44969724715422b77bd6746f1412839ae8de18665987603bb500707dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57db4cef3c6e53266e29d698f58ae491f
SHA183e6126780ee065269c8ad216bee8926b9b429af
SHA256da844757cc4c8caa17cf404ad047ed062b02eb0b53fedf538830882c2d9b7846
SHA51286586c8d1f3531b1070483315dfdea7de320fe28e499360807280614562bade6eb7cceee9d8961d5b705c762624ca2b9cb68b7fc4de358d805b9d7650849a244
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb5d4c0d3f20f5f5f65e160a35c108fd
SHA151c06952cd1d5e7c34cb6ba94ec021d70448a906
SHA2565770661475cc929685b88aa2c150d5b512a86d7e9d74ed3be9d26f85fc98bf77
SHA5123824793a25d6f6a316a2e611b48e543597e1cce40fccd66217a5afd54e346b27007ee937f4082fbd0de71ca5d4d22e1f95016ae839e87955346ae270afc775ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dd568f4e8fbbc2670617f52847708f1
SHA167d3bf074e8d9cb3a5e380647bafb6559f202f8b
SHA2565e57e1b6b4b130d2c2ddca3005fbd732fb303fc21a3f0cd35fc8ab27e7120a45
SHA51265b0ee94d99c722252db066a1a6c2cc06efee7cecb23de05d8e2441cb3484f0c8a8cd1ab8356cbb2422703e6c10ed52712120953c476f015661337957687cfa8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5660f660914eabeb7635e691a35465a82
SHA1810e9688dbfe1db23a359af337a88b088b455cbd
SHA25628fa39afc6f6fe27bdb0f4f5c947dd03939ffaa8686fbd9d54eaf498f990c957
SHA512c521a58cdb52fb63aa4a1554f0305a9e9c9d9060149092f7ea3c0b63cb556bd879bdcc820db0c1650602e4bb8063e6cf264685a96c869a6db6ff2562e00fe4c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fe8085363547482346cf986d72b24225
SHA16d13e41f2db92f553e4fc2b0a4d1245b69ab4868
SHA2566cb9a393beeadd17c99acdd5c57f994184b9e6872c3a9d2a3595d6717179ae62
SHA5128daa853d7e0aa08528a4b1dbd3d3c7242e59678a25682d282a0f48efe0aed250ffcb0340772412f01ab2e75cca9192c86fb1cc3e8d3a2e9a5f98ec8a37e72c3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f1c5eee01477cefaec13f55aa8ee3705
SHA1cd11afae3065bf2b47b103cf4b9407f3f957eae1
SHA2564437d7b65e4aab5cf8bd4ca628786379cb79fcba8ae893c2fcb4637f1ac0a631
SHA5122ceb575107a1a51cc2534c43596c8a6ce228b63d47d3151bd1ca139c4e13e7452267cf334c4f339e013fc64ac22c563467f515b7899b63a577e849bd7f39cbe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d56145e7ff8e3298c59e00ab30bd4525
SHA19b19adf0757510f60e127e80281551af663dc354
SHA25686d2b5a5ed87d275d2e4229ab4821a18063fb7db11fc6614137ad1fb8ea69b1c
SHA512874f7a26955b116fa334a5468ade2e267c5637446e11cc8a52c2b50e4fc5a2d82810141ff79fbe5765e9d3bec0ce988967d43d54060a918cfcea032245243304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59371346ce01263ee75e161f69021d6c9
SHA1c4ea1ce44f8faa1f3290609ca38e933b61c62b7c
SHA256d988a4bf1c060f766509f015fb342397f3e625462d3f8771e4956a449cc2dbc4
SHA51281741335abcdff771cc7078c819db8142263400edac00cfe9eaf8004ac7ec57b395a29592e4a836ccade344eb7960c96ba24e942e67e9ea61a0013dc5a0a3fa5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552cf7e635ffba8cdce55d080626e43cf
SHA1693e2ac46bacc1b2579deb4b6acc0fd3171b658f
SHA256edbb8466c5de8b82d4fa156516e4e881947ad0acc15b38c38380d638c12e17a8
SHA512210514a54b448f7670e3a4846c53653d9407065acc5f0433af453a26dec1a2429beafe02942cbe8d47822c9d771102588f2a488672dc7ddb62a399b9c7724181
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b