Analysis
-
max time kernel
118s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
a0d7ce9e777686c6e4e5dd79137d3e71_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a0d7ce9e777686c6e4e5dd79137d3e71_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a0d7ce9e777686c6e4e5dd79137d3e71_JaffaCakes118.html
-
Size
230KB
-
MD5
a0d7ce9e777686c6e4e5dd79137d3e71
-
SHA1
21b32cd4523d99aa007a04ee5e8411e8ebb44c5b
-
SHA256
6222f725b28b952a33b25ac9373e1a56cca0faaef15e2242375927b36d13e1f4
-
SHA512
b6e5c1bd1ccf1a303f89efcfb4d4994ebda59d528f59ffe794b3214af0ac7eb9656f9e261c2d1e255793964aeba10134c1b0f74860e903d84ea41f89695254a1
-
SSDEEP
1536:dUcJ8Z8PO8xuFZ+8x04pU5aDwxph9jA98Z0ojjeSFZBFEDLpSlXjZPDWe3AN:1dMQnsGDqpSlXjZPDWe34
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7AED13A1-28C0-11EF-A490-4A2B752F9250} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000007c3ae8a71482bef94ff4f3444f7b48f7ca0d51810fecde417ec889dbbc640109000000000e8000000002000020000000f1f5dcef3420543c5b3d2187a71d5ae1731ccd847c191b142ba6fca22e1a545f20000000f1df95d4d450764e03fcb353c4528917d068c645eae501fd453b2d0f49f2e28f400000008f364bd2802921ce75a3bd2a445a9f86788041fd0ff990f1b367d7397eaca2f13adc359f4104934e4dcf5cd9419cbf5a382fd9e362b4510083dee328782a0e70 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424361131" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b083d87dcdbcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2804 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2804 iexplore.exe 2804 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2292 2804 iexplore.exe 28 PID 2804 wrote to memory of 2292 2804 iexplore.exe 28 PID 2804 wrote to memory of 2292 2804 iexplore.exe 28 PID 2804 wrote to memory of 2292 2804 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a0d7ce9e777686c6e4e5dd79137d3e71_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2804 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54ae6dcc2beaeac6e3a2f9713834a273a
SHA17b993c2291dfb16c6e12db3cfb453405e58707d8
SHA256c48ed606b758bcaadaa5643496783f793ddf8ca4ad4b997a84f0a853e000f3d5
SHA51233bc5fe2e40d50cddbeb651810eda055c6e5bacef69d8694b2256e87050a93f4ff511a108f7d820ff030dd23170d0eb3374b9561df3a0278b623e6fc5b71121c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5136182573ddbcb3c68ecae5997665b91
SHA1238431fbd1d10e95c23e2c9ea341a0b946947330
SHA256f1a6773f9858bda2609995221058a861a7c2885025fab6082de513bef3489d81
SHA512993fb8123a7bacf92821ddaf57617931274c3d12e15ebe1d9b4bdc60bf6d7d72cf6d15600aff79b5b39b8591d3d0140a475950a4b8e3a95615df2465a778ca71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bf8670f0479a599ddff064fa60b98fed
SHA144a116070e8374bba2e64adade5e0597a785b620
SHA2566e1aa96c8dfb12d0049f585c291411d4e7663f847262a387fb81b224b8ada259
SHA512f5a977f01ed66bef0df4483b774538dd2e196aafa1623b7aaeabadb2e752aacbec415aa45f328731d4439768a04c1eb251fafb6f442234020c0f4bb11fba0aba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4d3727c90e49a9267d528a0bf9504c1
SHA13a258fe9da3ae5c6f3188ba7cd2e5deb270a9a71
SHA25634ba3116ebf92add5a94f2d28a3f9d87a746a7f64a123f46b274fae86210c389
SHA51253b40d68de89002741fd78eb933e62a218f2b5bf38a9e811bc3a53dcc76d1e47a3edce7746e56dd86f816d0387e3c1420ae687e432483d32e917deb554c9ce02
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5024ee3e2623293265dd334aec8fc8bc3
SHA124a85c0ff83e15eea91b2b3585456e10b068b09f
SHA256aa8737eb8da77d0e4b1c01abec1138236364ed1f5fa1b93ee37a0110d2995da4
SHA51222eb339e1f55713edf986f93d0c65f6e7a25728b6781a0ef03c7cd60dce99a703db62e6517b5b75f7952a2fe610fff8c0f53727149823cfd8d0b281822a86836
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD577e0359978a053cde98577f22fb4dc8c
SHA1052bda3556390e2323dc4675be1c64da6c07280c
SHA2561684077ee35f631b20c8c96476640331c24c3c40b0dcca8e8168bdd7a093758f
SHA51280540bcaa7e75f3fb8734a73f4e8ec97fbf53eb87ed34a85ecfa5f96dd621f6c90ed504913803955193b448c860785f838032fac0a7d76ac6d0bbb708b83c305
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed4eb9b5b2f738761a6a29da59f2ca7d
SHA114935210f4a8b3e2d5bfee0ce121c852c13095b3
SHA256decdd3ab453e0bf85907f65546bc354b7ca35f0910be6be11029133e8a100779
SHA512dbf7e7395485ebb906b8942b2ba3330da68e71edac13502dd6c69bc3c6072256400a6d7b1710dce23fc0ff447b0b7256c589196f6507e548918ddfd4bb0a5a49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e7a5a74a97083677082c1ae68a37f6da
SHA1ee5ac43cf004b253669bb25f8f22d8e3002866bd
SHA2563718d4c1991a5b8e4f959dc5ad3c13275ebbcfd25c8b6efa95500214f590aafc
SHA5129613fd93f1b0290acb129218bd96c383b69cea3e4cfde74cf98541ee946e47676885a03a6cd389cbce3dc105cfcede4ccedf814f8456c6a8c8b6accbe09ba5f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5661fa1bc8a002e8af617bc7117d57ae2
SHA1218b9c13f7a691094dbd90dcf428acefb7c73a62
SHA2560764d41fa154cf5466754bd3f4beef5d71821bf5ff0b7653ab8129cbed6ddcc7
SHA5121c7ef7da19a6af148a79007e4baa42333250884a62b501a74ab1f9917d4c1eb716585acb7531c6b36db0258134547e4df651d67083b12b211f5013e9b9ef950a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54337a94eceb27af9a7c594785114465b
SHA159d1261517600bc365b3639cb4709194e367aaf8
SHA2564f16b05caf75a69f8e8821cb76a145c7e906a9992e2cbaf3194a1f0ba3346675
SHA51241bdca78a9bd6897a8fec723c9ebfa12e33ea9a5ee7bd8cca85469c7ca4cf1c50a7d883ead68dd17871d485aa3f04a6d6f9d423b3fcc454910e5f106cc6cec91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572746f6b2f29b169ba375a255595a559
SHA17de24b9858f70152da9060e2957a6ca2d1a14aad
SHA256d8670cb299f83a0cc8eff9d2178e3e0d7804ec90f16399ab30f1f7241cd8224e
SHA512c86f3a33c5ea2f0ee5fe562d1327391bc7c9fc1795030ee2d1de66263bb62d69babbeaa72d55d3b9c48cc450564415e23e8b9a0f4286ed0ac273f1cda8acd166
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD508f53147a3b1fd7742c5aeb0b8f059c1
SHA171194f29019b915214443f74598d06b4c60b187a
SHA256a25df2db5ba8c583439984d964e61dec6d17f3f2339fcdfdca5327f2ca08affe
SHA512dc48e6b03b4dcfeb1a276f9e2d6bd33d0eeda6d961e2839785bf4056c9643034d55989ab52beb0e07ffc8a16c2e393d0039baad61be847eddcdc8ff8a0b01e83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e22633f054187870859b84a4a2f6d92d
SHA133c0a83ce225ca72b3079debfe886c0201c34ce2
SHA256f67e85b27701b4050a7a2ed28a40fc239b95f40fb88624811a5489647ba7e9c2
SHA512e6a822fb8fac989a70a8552f35df171628b3d9f75ddf47979fbdf89ff8e0a11bf4a4face71d641871e61a30b59484f96c97c2aa2621ace93cfea1403a4ee4268
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51ce81785b9bd0ec34297ffb4f3efabb9
SHA14826c93cbb416f48b60d3c522c3617014973153d
SHA2560c9a09e61f7051d50bcbf2a8f2db16b8de74b2e6064f44eb9be18b1a9783a4d6
SHA512c10dcd24041b1f4f65f249b719c67053c99251c5fdc114295d924602960331208333e43a4fd01019c56cbbeb248922876489e9ac06e1591eff68288a3b0479e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d6fe6e93dd1bb2eb3f8e26043338e9
SHA174fb5d6cc4eaccee36b3c1c38497beeafefc0c00
SHA25639ab3c97e6572ab95e9f36e2dcfa2fdcb7c7ff28876acb1737e6d53a26599b9c
SHA512892b5ffee3ead35e629181a74f339f06ed7489ae4c7d599209d602a639b503b13461d938a3094a26a73e9e171802643590632011411124eafd081cb397115ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5980511a7f64917b736890a0fdff1d6ff
SHA1f7908b5ffa6b2459072969154b147df828976eb5
SHA256716a45f2f127340cdc2692312d80ab66b96a02ecc22914e385f72bc117a422d4
SHA51291f0a09aedead95255390068757b8797729e925169494cbe559e1950129f5c610c1e808ca45fbd4e0cb6076a4fa44cf186bb5b80ddffdb2bbfba8ad68530a772
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528614bf1acf10aa3aa2d3c8b36dfe2a3
SHA1c337caafce9ac557e50b43f45d35851cbaed56fa
SHA2562b6f4ca52018eb38e252a330978c78446eb187a2d183fa3ea30f811d0d91df87
SHA512ca153fe115ffb554c8be22bd99daa1548f5208bfb3d79e6bb66ecac9186733e117b21442cda2e1357970492750076463192ae3dcee63cfdabb10c6c9262a04b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f0b14b5188be7953abf6b9d9eb116c5b
SHA1abec8fecfb8f28219c0678cf20f518a5aac5c623
SHA256575b3f455ec08ae8a68ab2213ff151631e013bcba4af4b12cba685074010a6eb
SHA5121be00c349cc8b428f0aceb991375b0e8383d95e351cccdcd5367ae51e1d1f06fe3d68f49b20247c1001f43f070548e0ebc56028cda983adab31563868f12c107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515d40b57b3d53952756bb990d6d95efa
SHA1c153c530fb022d2f2f281787e33b78dbe4eb674c
SHA256d9ded872c16224d7479fb763472a3492a67ba6f9a3f586045b448b12da01e907
SHA512ecdb622e610769dfbe104d9b6877f06b9c2b0affeb74c97dd5cf1169e633e72e0155c04949ab7ebbf96b9099da73e203f5287322e57c577cfe5c0a2935aeb6cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d1b74ce21777d81dc6273fd1430eb8e
SHA128db0cdec5d7682ec2a0fd5f87704acd985f2a8d
SHA2568014edc69cb922a8b53a0e7dcbfd8dfb0cf9facc6a4054045868a50cf3a706d2
SHA5121f64a8a50982c8dfd57d7b29727c6af9176cd77a983e188f3ef74afb9eb833919b975eadfdced5c8c3244a8ef5748c913fffd6b4c0c84a42f736f3778282d05e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b