Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 13:17
Static task
static1
Behavioral task
behavioral1
Sample
a0cc7e753ff157d69c5037f8db0ec504_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a0cc7e753ff157d69c5037f8db0ec504_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a0cc7e753ff157d69c5037f8db0ec504_JaffaCakes118.html
-
Size
15KB
-
MD5
a0cc7e753ff157d69c5037f8db0ec504
-
SHA1
fd7e57c704f953dd384773f81f4988b3a18b4a06
-
SHA256
985bad20ec9c544cbddcdfee0182521e099917370418a4b63eb3a8103527ad69
-
SHA512
32c4b2a89a390826f24af5d411eceb164c86a7f9b84e5b5d8f1e469880b8d465f0634b6a58a87a72ceaa43141979aec83e53bf5532ab0134e2ff718adf26868d
-
SSDEEP
384:S2rth/u6PiAwItceCjzqR7mPU8m66kDgvzZ9wAYdc:Sgh/LPiAwItce/R7nSo9
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0F019551-28BE-11EF-8F92-565622222C98} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000af44bc4450cdc647bfb85418e9249b44000000000200000000001066000000010000200000000dd64e77e1d19cde1db4e62ee2dcd3679d3988ccf9476e21c2d2d59d31efafd4000000000e8000000002000020000000920b6635a46bb65c45ce0efb822d2119571bd79d860e07ea4ced3d110a5417fe200000000304224e916b6c00c48d2d80c01c0de7de9421c9397b20aba0d40648e1018966400000002d551800e13697acb4541b0aef79d39c45b35a939503db81b5182d090aea8502fa996c7d1fc10fb81dd1ac968c3a96aa721c15412911bb2338a20b999f351027 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c062e0e3cabcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424360091" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2872 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2872 iexplore.exe 2872 iexplore.exe 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE 2956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2956 2872 iexplore.exe 28 PID 2872 wrote to memory of 2956 2872 iexplore.exe 28 PID 2872 wrote to memory of 2956 2872 iexplore.exe 28 PID 2872 wrote to memory of 2956 2872 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0cc7e753ff157d69c5037f8db0ec504_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2872 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54bb1cb6acf5d550c868b083db9f81b8f
SHA1602bf67a5484a8674b9a29452b6fef7ac51ac499
SHA256ac2b5b3cb9c29f89be11e159b39817c8a03ab97fa7c91c4a885348a5b1c493a6
SHA512280c3d8016ed0e9e985058110e5d3dcff7a4e0c4d24dbde4616235a81159cf74d82787f374e75821b059d96bcd0e5afe626ce379dec1b5ecc58ba42e115f87c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd1b3535cbfc10c462e1f261386ae4a4
SHA13f5c55befc519568be82db41f6cf00924694f19d
SHA2566be5077bedf353c9c16367b48d5114bf02508099183c561f43861d1d722f11e8
SHA512534a12db6975aca1fea11b8256388dd1f86949ecc585070729a345c330c263c6a75f0602b17437f3c226c21c252329744450e123f7ee24578c52680fac0e221d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52ad55907188f8789fd30d44e9b16c772
SHA14bf36fd291f1148d3cf433fe20bde4c79b3ed716
SHA25600c65ee8baae384f45d27ed13e7a0ca793b093f5a61b372943b3e75091dd91d1
SHA512485918906eae0e1e1251b3e35b079db8aac277f471b4a250043b0621d3fbf2f98ceb6026c6662a1aff5feceb77db67685efe94abf6044e2ce650dad53ddf8a63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cade10009a7d3b5048ede9e734269d84
SHA1a697b1807a288d05c874f2ff7a1fa87c269fb293
SHA2569faeaf25d94c2319ea299e963aaa2d395f104e5b8c83f0fa5cde8f0667f41796
SHA5123dea87f8947ca00424cd10324e4b6fa2cbd5b599fcdbb40be08f4421bd4c3cce27ff1b68afa06d4ab0187f4448ed2d546284156e0fefb6da46d7e04f86df0944
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fa485624344d4165d423b19fd5f768b
SHA1a40d2041a676fc133ec409ad181854ee719a15eb
SHA25695926d19be74e63902eae0b674b796bc6c560a303c277d8119738bb8cc7acb4e
SHA51221db524d99e41ee2beb4d3d444a468a692483733d954b219840b59667606af85a5ab15e4a39533c46a381c6826cf985128b52160d2f1be27fa709a5733e7a329
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7cd094edc635888eb5d06de9f628d86
SHA154c59c287fa54a01ee6ffaec8c679d841d69a670
SHA2560759afe60baeb093852033ec08ff81e1d97b55d9ee8a9120687aaa26075a252b
SHA512a2379072cfc17b6ba74f9db18a0f6b5c93b45548348ea201ae35cbdcc2352b8a9aaa2de060561075b1a686e0433fe43d7bede633c4265a94855d257c555eeea1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c26e409749c52d8e63f7d3049e8f94f2
SHA1004558a5c64a93036672f5b9fec5f5434f3bd24c
SHA2561faf2c3c56877027d94f728540c6a0792ff74faab64f2082bfacba3c8990a4c8
SHA5126abea4bd4fc70b7063e73f94d7b8c33bf6b313d1829284ae1ef45868180fd9af233a48de942e2f601fd7e98e1a84e2f278aedb2570220a44053efd5e380867a8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58c9d8104a58ec192a0040c37b2bf3436
SHA17c7343b4eda4c18798b0dfde189b97642b7ec178
SHA256e064369c77eea8ce1f4a497556f97abd4251ca32819f03b90246b72e7dfb8611
SHA512ee55cb82656c490d5bebb7e39b106ca7c91029ed90c609397b9ad1bab9cc0cb467c99bd10e3d1ef228fd419606c13b396b46d5cbd8930667b1516264da481a75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e21695529a9b3dfee92c806d697b5b4b
SHA1040554e14ca859f314f542f2b608d929d50008ef
SHA2568e496d50300439ee41eca47bfc28ccc407ef5113c73e3dcca41efc4449a558ac
SHA512d900c9bef528925602eb738bb63cd50dcc3e70699425d3a11402f9c264520c824ae540cbb6182ac46f6a005370b834925a0de260fa110f1be65374b8e31ac8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552f297cb753cc5d2c5a8564e08655b00
SHA13b70153fe81c9eb958b30b0884c68f31f2d70056
SHA256065fdc7bfeb63e5a473653fd2a625bc17ec9826476afc8446f8aa00e03e059ed
SHA5120e136103113552252cf1245beaebc834a9ed1d104f0fca1d697ad252c25c27fb5b956a9aa326ba8d83270aff952e14038ceb3193e1a4168b000b5624dc95192b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c8ac8830ad1eecddcc07139fc6cbbd3
SHA18aa1ea30742923813016aa52a29a97f979fab824
SHA2563ec28836b20bd98fce87191e0329ccbbbec4e9074e18a7db44c1d9ee0cbfd46b
SHA51202e2a8039d390bc2c84bc4718a8ace6099ecfc5558383985c50b07709e79ab40fbec857ff8415536a4c039a184810c6578ecb2c530ff9936c29ce71fb738a332
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ddeeeaef66a43cd49a7eb2bedc5efe61
SHA111b6ad530185fc10ba372eadba01c7960b9c6e0e
SHA25669455ca4d69f9487633e5272892329cf37951a37c4ba8e76c4dbc897e48a09ea
SHA512e7c9309d6cf475e6146583aa342814c4b16797197e2358223875587c7115d7640b102e43f6b03f29da78494ed047ee5ae5a6151c17c5fa8442a22ce8c4e20a68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f560f87cf4ccc5660ca884df62fa3d6
SHA12bbf4ac5e5a24f4c3020593767bd42993250dd86
SHA25666892a491712ad0e9b47684986580bc445ab24de986210d69e559a5118fade14
SHA512ebdabfce4d9a2463732187185f51aefdda5d3cb249fd73c06afec53667320a4402042a78a7c6fd7eff7091db86fea7e7fd8b52071785706ee329d98bef162191
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc2aaa809befbea7e0824e27ed94847a
SHA1e2e1ac4e69ceaccdc3012999a93523f120215164
SHA256b384c2b3300ffe3647d0a79b92368165b98468283074fb363a749299f147b33e
SHA51246acdfda4ce594080f0cb08239e18709c967a60cc38da23ed3e8ec5759192b55ccc694045a59260b1f1f690b6e00c038548d54f715a233c2082f33feba627b05
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ea58fceabb8d09326598fe7da0eac01f
SHA1c12db490528ec4ba2dea33bf99d00888b877a8c8
SHA256a6ba689472086be35f30998dca51242d94f336f688eedb29e898a4b9c58fa6a9
SHA512a658b26c60ca9ab47590c7a733abb7589abf81e3e888a74bbe4b3852b4dc85c57ad37e0d997f71fddf0b5c6f7a53ef8b6181299c2f3b1143d8000e96251baea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ef322079e299e3fff4b92d0913deecc
SHA1362526e3e12f67862a210b56fbc1d0caf6d0566d
SHA256b1016a3c5c4021be799b9f4547897c6674da42031db5a59f201bf1182a175176
SHA512e46ca31d2a1d60f77e40520a64ee0e3ac79c91c1ad0b393656f5a159b630ede7dc7c1d091d5ede14afdd3711826a2b3be33ca5e37c4ebfe63612f2e3153373ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a5df20df05a08f10ef3bdde215b05423
SHA104026129d43dfd8339c1ca33c4be2cf2139a3de1
SHA2566956be0b491b6637c76bfddd6d47364542b62c13d35bba8aba8aaca4af5fadc3
SHA512d2eedf7f2dfb4970d47fc593dbf75c7b004e49f56e126380751329f09565aa03ab3ead42ba6b132b30eff028b9467c4706d56e046dbd5ca51bb2716bcda03693
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532c91304b6f823d1b77fa0957bed6519
SHA1288b9cdf8e159874b6f9d9a90e45a32d2af96b1c
SHA256cb1cfd2cf185f993512c20c97603169170cf9d63b5825485021d5d7b5ed9d59b
SHA5128c68cbb1c5a1686df685cb60d2e0f37c70ec4206091a04ac1bc246dcab12326ee6a4e9bc236bf40b9e18857125e448a8344cef0b24ebf682e6b6f3cdcfd3d1b5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CY2G78MW\yd_rp[1].htm
Filesize124B
MD5ef21a6c89e0ef6494c444efca3379958
SHA117f858b0fc12bccc7322e0db50372d46296a8de8
SHA256edc67947daf0397fe1be61af67a658bd073af0704933d3a0912be635926ad957
SHA512b7f70cae116c04368b0997326b52dc1234e71ed8055ebd312afcfc8fdf5b6fabcf572e4dc7d2befd21198c476e608166dea7a85376ad5b4fc535fe81e69a82f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RYNL6UIN\prettyPhoto[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b