Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
a11b688ecdedd96a66eb8a760f1f1687_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a11b688ecdedd96a66eb8a760f1f1687_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a11b688ecdedd96a66eb8a760f1f1687_JaffaCakes118.html
-
Size
62KB
-
MD5
a11b688ecdedd96a66eb8a760f1f1687
-
SHA1
975e6a28d9d5bf056e77cb1963b65e9313c21303
-
SHA256
5244d8e1222ec84cb2a686a088490593d906b8f3735a71178d80309d25667b09
-
SHA512
c793260c692277ed6a380c3f8e6de7aed9b140ea2400b4e6e881fe9371ec3faf54e65db0fd69e2105f1c98a5882a9ce6afd351f9b6bf97010e6a4806f2624707
-
SSDEEP
1536:OzTqLd+LpJqaTrjLf3W3dsCAIYfKz/QCQjS0F3IB43A3hMTo7EuPUwv1nEEN9OBE:OzT03dsBIYfK2+XyWEuPUwv1nEEN9OBE
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0DE675E1-28CE-11EF-AD12-DE87C8C490F0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424366961" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000035813297095a9b4da1bd1b57d6da391800000000020000000000106600000001000020000000513804e9e9304b168f7753200cf2bef13d1d074d66139d5dcec955fa47b53a3a000000000e80000000020000200000001d8d33a23f0931d6555cb04c81135133891d4e2d56e0418186d18de65ba8d86720000000e1a24661eff3d4142adf5d08e3a336efc6b7a170b1efd8ab833d7343f7d2b62540000000ac2608a3f86009f8381f2cffb86c655c9493d0808bc5509a41a8747270b45f8fd0147b1a3c3ff0561b43df5cd58591e5bd553ebd8b8c31d4e050c9fc92965846 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30da01e4dabcda01 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2340 iexplore.exe 2340 iexplore.exe 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE 2960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2960 2340 iexplore.exe 29 PID 2340 wrote to memory of 2960 2340 iexplore.exe 29 PID 2340 wrote to memory of 2960 2340 iexplore.exe 29 PID 2340 wrote to memory of 2960 2340 iexplore.exe 29
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a11b688ecdedd96a66eb8a760f1f1687_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2340 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510b1385d00a83074a3ea99e781287037
SHA12033bda229f43a2d1d118dc9e458a2dda342e67b
SHA256c9bee265cdc4540b04c7feeafeef3e151af560f434e2aa059dbdbabe722722c8
SHA5123e2636a8ec6ebde0b9b43e292bb89b1333a26093a43bf24dd3929f5088e1c4facde34e7711c2d312befc105ddb29208a78a9ff024b1d3cb78291b64e0f5ffa13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2f8690c421cf97ab26c4d1515f6116
SHA1d37af7685a6f4c062a103f1d815e231d5339ed5e
SHA2563e4d1d35a916dc226da4af9c99e4221f3b8364463ae06d8c080b8bdc135344e1
SHA51233ae2cb688f6594eee672b3813ae2f139c1c8d0c92f2182e6b3e5f774de6e3f897137bc0feb6afdf7e447a0406eb30ede598df4b35b29988df82a8758da7cecc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eec7b8e99e0d31e32affa623366b0f4
SHA1c126bd3922bb6bc83b86cb15810d7158b99f67c3
SHA25666cb3da641ac18c693ae8935ec046dea945ad41e77a95baf23f9b10e738739a8
SHA512754c52135ea61461dfc50a80d78e43aebc20e25a4ec70b07c0f5b882b161c83d288f9cf2172edf4df520f168a7293c7405e5182114a0f56c60e413482e67d2b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50618d2a420a228885d5841e2925fbbd5
SHA1a4445d9bced46c8e0408630b5b3cd55ac5c2c948
SHA2566a3f1a562db5881b67b960689a2344d2b87c4c4fad45e00c77b73c369b24c0b7
SHA5120e8613f37338cb6929f7baa4eab663722aab79cdbc1f2e3ede91c1b6fa969c94bbf0394fe2a17e504592460511d2927bcbb972b891733a7015402e95e52b7e91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522b9e1218ba79bf12c6e645f656e4a80
SHA19210c2f852fa4358ab8b0c3d03c69805742fd94c
SHA2568dfa9fbbaf537f6bf8d383991bfaf79c9eb80a025990bacbd1f2685e07279142
SHA5122bea031a35f089fe3a6c52ba11961d04e2a43f6f44d7fe9b4ad1759a6844961ca4788e1e764267da9b5f0468355ab3d05f9966e79a9d32775e68aaea9fe26eae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56de457a035e9c2a4aad3b5fca3db94c3
SHA1f362bd293f421494a1fdcbd742a6b014a5a222a8
SHA2561b0753c9efeb7b3c0ec522f313e801632106d900adcb40916605dc82279dbcbc
SHA512345d2261e0bbb0e771346e9329a43d2942db335d3c841dac60e38196d015fcbff91f32fe2c421270f763940df76f06585381064b09eaf214dbc6f9b6a28feeef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8a33829b49414592f3d651f435bff95
SHA1cb9242f58423ec1e9d09cff373ff931834f2a564
SHA256f41807b6451273088fe2e20dd52040c8ef0ce9ed8f0d35f4e03a3e37343c4db6
SHA512549e184f2bd594dfed80da73e729cb063d213ca16d4a8662015a32c5d1efb2ba4528d002d00e82de9adc1877205f19d168754f8a51f019ac5e10c2c81a5de920
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53f1eeaf390e8ccf642c448b83db7a9e7
SHA1652d5891e36a6edee35d749f8f8bc5deaf02d556
SHA256b66366aaa47c3134525d92573c86dc03f962bfcdc5e271af7e9a8ab24220078b
SHA512c3a945195ba7089999d649776b08b8341482eb275673ae48d10de27c277bcdcba40872b348702da73248bd783a3db86670c3ea8ad3fb9c870eeebe98ba3f5327
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f16c98e39b8e8ee1f88bfbb18f107e8e
SHA133403815f49449eadd938f9c9c9ab01059a3bc38
SHA256da3206313d8441ca1e8eaa837d013b5e8dd3d182fb7df1ab22e958ccdae0a214
SHA5122fa0edc83cbae14def3f7b21f9ede37a16292c4fe4b2dbf1a22ed566587d4733418e2d28bd1009993657f324227322ac7907b6208a0d8590e9f8d8dd07bb1246
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c3437a5c2552774a24da2a9fe95798a
SHA12643e3ae2bac7c8260e58c756a50660a22ed3620
SHA25681d29d5e6b461c14eed04080affb02a2fb1feebcdaa9d05babf140e97f799a4a
SHA5126ce4cbb59be00915306365baa0e7246aeb9f4936a0f2136cd192d4e18f9e1c1537b83a1d41c0ba31b2b3010fd180538e86c035276b241a7c4caa27651b3e6bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528e76f10a14f04f598d2e36f07290354
SHA1f07afe5638544f0fd33ed3599df8379deb29ccb9
SHA256c618bc3d96afbf06c093b647ad2d178e703752aaee6db77b9b19b50f200a24d2
SHA512fcb7abfd9843b906b906542c8bc03efe2555d2db2a2821b1d1bf1ead94e55639f0fda9951b02ca82ee24bc21c72848eaccf86c2452cadf3600982aec287e5230
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b318cfd0b20ad4d658d1e5d2031835c
SHA1cb985654ce37832ff7b1907317f23144f81c5774
SHA2564b176dd53b034c47e20a24876122ed621792c2eca58d9ad4c30af90eeb5e31d8
SHA512689e2cc4d48616806e87eff4edbf69f03b5538830f19c1a3ebc3314db1feff3b2e80bd0707b0b44d60284f521ccb83c12977c80640962f9b3264a20775218ab6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51dc04f3513c8f852a3560181a87c2565
SHA18198e38f536b3eec0022a14e8128b9bbeb4f74c5
SHA256b8aa3cba6fb79699c2dc223d17ab46a1158f8889f298bc28aaef9f2543ac9972
SHA512154a806a39dfafd733deb947232969dc8c7536c1e66be04c3e35f7ca1ea4c20f84178676792c582e6e63da9c8f5ba63883d110bfa3aac477dded531362f77d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5666fe8cf77fd01c66579540d46726766
SHA1388dc03dbcec22db0caa0f287c2ec021bcf677c1
SHA2563b13b5f46b6de4423b64b0813f2a62c7807a1dbc54835aa961c34d48458153a2
SHA512537b88b9557760a0dfcf095dc4aab412f682d42eeaf068d3d3afa9055daeea1285fa52807412340599390a35cc3cb35baa046dcd442af1b4276f289eb706b4ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a520a35ec9eab46c087446cc162da4
SHA1c4b4c16798319ca66bda7324d8b1c21fd8580ff4
SHA256622805dc067ea61193efa03ff2d2d8a5097871fc6953a8497c3e66f0381656ed
SHA512bf00a9ebcc0409aa8c72ac24ff069fb2437088a9550d812e20b9e3383d16f3939af3f8fe39423bce969e7b2d63c569ac7a99e943aca5c00e077f818abf0072e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e4440ccbd5e756ad66829e000ed67cb
SHA1b7a007b71b01c4a07d1a667bce563b3ca4f87e0b
SHA256b0e2c81b26bc48b4e8da09e43032087bd39843525ed4d95a83b7855bcf4689a2
SHA512a39345943cc1b061c13e33e00cbe50cbac307c5da5f241dfab548e3dc935f2faef641c8acce3cf396c463313672349b79f3082f1bbf3eded9036b56f30d93762
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e77a6c9f8096e02a0f424f6c3472c7be
SHA179040aeab0e35499b9bb935c682bec2e839bb7d8
SHA256581b385f73a65373ef6fbb9e395537faae0d9863a5c4a4fb61732705db4146b3
SHA51225fa3ee51fed8a9c5cee762ed95ae76da67a2b95c9b96d3d096f42a96bfc0f7b4e182e5834ebd31d9c5959a3be296f10731e9bb4a4a475848a0c6500441f2d5d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56c882a869e6b240fcdc32ebb0fa8973b
SHA140e77fa648c3de5c5ed34de5c36552b77bba92eb
SHA256252d27ccfb90b87ebf275263fd036fd881df23585bf28a13406427e7775a1981
SHA512535252fede852a57ba70ca22ff3214a2a41e3c3fa8822c1e9d437ad0cee9d5a9d3b1b1558807c588b8c4223727c537bc7c3c4340ccfbda12f87491968a6bafaa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57e4df901c9d2af78aeafcd5b5e8e082a
SHA11a8a8eef17cde6bc3b32f4d56614456b8d441b88
SHA256618d9a501bbc18dc1938d578db7799066cc745d06d616a5fe2db5625983d3974
SHA512ddc33979f6f75df0ab2d6071b49c8a0ebdd2e421eb837fdf0dd7b22ae82ea3c81a839b7af4994d3601f36a1bf8f848e6a181230f1faa4f1f25238aca67aed5e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b