Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
a2e9186d79323deedb6550cddc6231a4_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a2e9186d79323deedb6550cddc6231a4_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a2e9186d79323deedb6550cddc6231a4_JaffaCakes118.html
-
Size
8KB
-
MD5
a2e9186d79323deedb6550cddc6231a4
-
SHA1
438597d4c4a51e4080be9aa974ea2c702efc6056
-
SHA256
908f84a923a6030a0007d41e4c29575581d951927de6dc2e7e4210f20e2eeeb4
-
SHA512
565f23a495722eef0871a9ef74b86d76e32e1d305f06239fb5aa5ceff26e071f75f4b68bea8e4323efd2bd5042704e9bfb8fb5713841985606ebfadb864497d7
-
SSDEEP
96:1/YFYEJUY0i/pKSRCURIUnkIMVAFD1G9rvRDMpi1KG7so:+Xqi/zVt/Gu8YSUo
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9D0E0AA1-2912-11EF-9EC9-FEBBC6272832} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424396406" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb810000000002000000000010660000000100002000000041ed28f62023781d7e90ce44506087eaf8d013b1ec3a4b41570155d9f6a7bb52000000000e800000000200002000000032e14291a1e2c6787e3324e22030a5887e5223872e5df6ec56b61936c152dd8820000000377f6701a3262ca7e784e8a5180c19434563dc13ad3e6e8e120d0c94c73ad91f40000000a81c470dfe7ca800217d25c04179df525f866c31c13cd9dbb6a788faf473968283f021aa01eb25f65900ae46eaf013bf30361e15715b2e4eb258bbccf70842c0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20bdde8a1fbdda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2244 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2244 iexplore.exe 2244 iexplore.exe 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE 2352 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2352 2244 iexplore.exe 28 PID 2244 wrote to memory of 2352 2244 iexplore.exe 28 PID 2244 wrote to memory of 2352 2244 iexplore.exe 28 PID 2244 wrote to memory of 2352 2244 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a2e9186d79323deedb6550cddc6231a4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df9196b5402dcb61dff40abe3afc1f94
SHA1ae2480e494749271196440ecac26f74e83cff49b
SHA2561193e55c917d8928f5935d2b26b13fccc11dd552023a280babf223f18a0eed00
SHA5124a51320f9d478aeaf78710cdaedacf920494457c670d48598759a63d0e0258c9db68675738d11cbc2242b1f9028d6a1815e6b2a8db92ac035a106ac63b37120e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b0ce823678b9b93589bd5e27186b683
SHA1a9ccc5971281c19c1a2b3862679cbe7bb0ecd992
SHA256f4a796e05df01a31272575af7b985d9791c393c1deb6d5ff4ed96d6d7ec1b247
SHA512bca9c3b8b137067d9cd564f9803fa2670148b77e29335aa72d7976c666e01ebe685a979fc62563bb32aa5367f33df37ce941678bc3d3055991f1256b5d82dce9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570aa0e935164fdb342ddb5e62987eec5
SHA109c9e5c92c160815b05d760abbe6c5122200aa61
SHA256e10aa6850789433fc6289027a247ff7f37d93e92520756b5066ae78d40c1d8ef
SHA512cb1b69d4da82094b768c2309cd5d6e49e74e826819e83eb3080c875674ed1660ee91006d2dfa7fca6c194ccea65b339448ba1b453c1fa269854639fef623673f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f124a0f640be1016781bde3b2a7f12cc
SHA1e183371f654660c41ef40320bf01ae6ad10ee147
SHA25685e7b65b6af1d39765acd7813775627bbc5bb80caac027ec1bcb4080373c83ea
SHA51257a82aac54c98fae21b2452386d29ca45e5d6f3c01d72760acf3f4e09e949e431d8961d56ab584a377a1f693c5b6d9e2bbdd12462c0a457a93574422ef3f014d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ce93abcd0ed90247339e11436e5ddfdb
SHA142dda862d27ac34f1339f91f97df14b1da5a58c8
SHA256550780a55a2940edebe49488903317dafc8fac60bfa3423bc4fa03b6e3f14880
SHA51285456f9a4d783af61570f7dfe7834d0fe926ec4cbe4f852865bfe1f352a7e856c65bda973d78d9533be9bd5ef74e24f4219c4c41cb5c96752dadd5e8468bca5f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de5a395be4cf5560a02c3ff5429193c
SHA1244b8df3f2070dc6f7b46b1d37c7ea6314553e84
SHA256dfd3cf2a17922450f30628ff33f3c4c36b9cbbddf1c79e30adbe418256f5d31a
SHA512e5a8f67115ec6a2f4a659a37a1b2c50daa5df61ac06538f1518d750025bcd1799c39a129ffaae0da3c23ece979343dff90d42e2da0f4efd8997cdb357fdc71c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529c3cf02c40f5a5b4c6840953b815434
SHA19bf71a2128b726811aa54c49ae2961c61b9ea93e
SHA256792574c7b754880b71b573d6438a4ef6e29dd197ec6b1429db1e507a50fb50d3
SHA512726e5a453b089d4536c8631698c87d2f47c4dece09c3935158a04b0f17434274da41fd404566340d7caec2e71781390f5a2caeb8108e17d1986eb1b74488ea77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fdd225dfab6a00300c4e53d9cbc4708f
SHA1ea21cc912bad1490c973d0a047fcfa2e87074336
SHA256c3531c9196124b2cd6eede66547cb4346ce8f61df1cd0b0d04a0e34cc20525c3
SHA5123e335c0c2716df8d21e85da44eb5d74334e2f093fba3fae60c3bb1b7c98fa8d5b8ccd7ee67ba1634d5654012066697069141c75b19052a7c2bf053ecedb1fb17
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5285d6420951ff8b888f2455e69d28d97
SHA1f7c634262b6af2ab03083db11544057de978471f
SHA256f5f90f3b15beda6fb72d5e9a1bf23c0fabc92880b93cf37abdad1dbbc88d144b
SHA512e365f505399113ecae41e06e783f99f6cc2a8234f42a38e4647bb853a4f6adf1ad19161cfc7c4a971948e9d4df815442a06c5dd9544c3b6d8086cd456907754d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a12eeac7e920f332fd116cefd62920a2
SHA19c9351c6a93501ce6104cfd86692ef80319eb285
SHA2564f676261125ed5b151da6dd3ddb32db81664bc2eec78c261a7de15ba2735cf57
SHA512a3ca436ab4d3d043907135cddba19e6039c56279a388469d31fac695c81e11474635c54add71564761f57740c7e0553ba56212dbd488be8c7df5cf98de3d10d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1955c94578bbb877a6a1d6c8c5c4d1c
SHA1f293f3d6ed5575f3196603b8197fcbc5c5f7922a
SHA256c931bbdc25498f644c55338c33985a7dffb4fc522da33ef42f825260c5d73fdc
SHA5129e1c71142a6e94023bdb08f1db3245dd79cc8f7d68e59ff380b0387ad5e86438a50c5a7ccf4d9e286d9a12f6d2b34d46c27ec7d85f1f74ad06921096309f7ed9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb495a29bf6c16cdfcfabb886b64a6f6
SHA1acd9f0cf214bad3e21dd9e5bd5220ae662dbca41
SHA256dfb23743537b4ec8dffc67ad054ddef05c711feb0ff7599fc1da93fe3df2e542
SHA512f21c7f56317541d02f6fca8a4676868808dc193a7e79675087107fb11508bf49fdd080af0a30afed966129416fd4529a32c93139e654cf5009c3eae4adfe9d7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5318e74a4d6357290b9a56b4e98ee1a1a
SHA147f4dd4b70bf7195bc558a9c0dd37e32844182bc
SHA2564e003c9351641e860b601fa9e6d0e9bf56eacea281056cc6285c076473b6e672
SHA5126382177cbfd515c348ed1be22aff4d2cc3133cb85a2d74dcb9aef825174efe7820dcef1b1164d877bc1a1538fdd09c9c4257da938ad68ffdb5e8289c2a2f20a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f21a5e07bdb7eed27ba8d28f13b47906
SHA1d159b2ef81884c13ee14b5249fc7ff184f44ca28
SHA2567836933a16b3d4b9104a7d28f65ef08b0b33e3444a212e0f729f6a0b0209a381
SHA5129ad14edc321a0391c5473f1b440ecca2ddda09d59fc0a438c8da0e54412ceb06868e3ac995cc60f60a102e00d59ca0c363e12ae9a97989ac08ccb95313774c26
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b86dce5281b74c50c349013e326e9627
SHA19be2130d6e0101b7bb50dd6df22a917d3bc3de68
SHA2565f7085c058029bd8d53d22ddd598984d60d8c2709339f8d9868d22f6fb1d4184
SHA51283732d8c95b29c89fdc6554a10e677302c4d56da5b5ea5a6c6797f14858f238969fbc5f5827d97289f8a462a67fac15df150058db9e51a594cbe229af0e6afd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d732b9089071065e40b03736cbae3bc6
SHA1c61851cada83c8f93fbb1cc7fb7787b49de82990
SHA256bca431ece55e52eb5917dec04c2e9f89cd4f835c2cdc9dd7543d241807a4ab0a
SHA5127306b4727fe7e5540a59160d0517a83ccecada386dec8d3df0c0e0f0524ca5037dbfcda3c12d25f14b00d2ceb8be93b1eaf90b8a68b9a71629082b2fca95f556
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec5cb0ab8e2add074de924b71d6d8a1d
SHA1cf840c91d36314068a9f6749fb5a2e2fd7e4d179
SHA2569123ddc6c25d451426d408f5b936e23222e19c32140fe54dfda7c15195ae1dd1
SHA51200e1a30e66beddd5d9b7e1968ba5b7b18bbf1e37a6826a8e26d8ee7845a64b5c417c8f23e497601e1110e5566c61cdd2ea579c6232a9390b3f2b5d427bd1f3e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581e46a1bf86f4470064ed411f46ed2f5
SHA1cf9f6a9cec57b662d51c35189583c2b78efd36d8
SHA256cb4121d93a2c96bde98a4a872053686cab3b2c892a0b3cba18833095d90966bb
SHA51291a0996d1bf0581511a0c3a35dc886129de308d16cac3a67a217e63fbdd967cec3e6b45ab57444d1e509930c2daecfc2e4be336143e861ef84474280f027232a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de9736e58f2daf786520ee12428afa22
SHA1ab34e9ed309a3a36ec6592439eda2759c13fc086
SHA2562a2ca13c9bb9554b87b7d069bf191c770c509295d9b4fa2359c1a46dd22e3e2a
SHA51226c195ca052d471f231e5a68955579c12a33ec2e6b6843352ea325e98f8d0258c83559f935a21617d5a0c5d272045c39e8930abd6b563fd6cf78029c79eb3dc5
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b