Analysis
-
max time kernel
132s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
a12a48aca1dce1f11fbb0b102b4ab9de_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a12a48aca1dce1f11fbb0b102b4ab9de_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a12a48aca1dce1f11fbb0b102b4ab9de_JaffaCakes118.html
-
Size
4KB
-
MD5
a12a48aca1dce1f11fbb0b102b4ab9de
-
SHA1
a252217748da11a54d8802c62dc217301d984603
-
SHA256
3379a53ce569b4f9d46c1dbbae9caf8deacad4c454bb4318b7390dfb6d943733
-
SHA512
63f2425bbc3a78744df60cb4c8158a72bae2cfb597eb6952c0178d665a9a5f824cd05cd1e6d4948e22fb95830d5600fc7dfa83f5799c67e16ee47428a8b55962
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oOZKDbDd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDg
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 402ac4b4ddbcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E04FA7C1-28D0-11EF-B85E-52C7B7C5B073} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e670274faaccf949bcf02c30a05a16ac00000000020000000000106600000001000020000000e829b84f79156474d36f131be215edbf4058ee1f5c813497c74820ff04da2b2f000000000e8000000002000020000000431744deb16e41a52f375186a6310147cfbad85d54090070afc85074cffc00ec2000000033723935328e626c43c3eb3b3df352e79f7094596ba0bcb563b10d36f0f22bbe40000000a67136c08f80c43f795359ee640335527da75b1fcca0b962cd9f864af07bb43a0d86eee27cfd4f48b4bcc4c69106d63f83f8e89877edcddcabfea07d4c9dc601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424368173" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2668 2132 iexplore.exe 28 PID 2132 wrote to memory of 2668 2132 iexplore.exe 28 PID 2132 wrote to memory of 2668 2132 iexplore.exe 28 PID 2132 wrote to memory of 2668 2132 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a12a48aca1dce1f11fbb0b102b4ab9de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451f3565cfa875296b1acc64433f6147
SHA1135a4b9ae5a4fdd65b38e19f9c88f4021e295b9d
SHA2566a28ed7e7dd841cacd599e2a47cf5dd0cf636172c05380aa9f58b08da3a24188
SHA512279c0f590a2f89a225d40ff01525d2ba6824446b3a5f3b5530dfa3be3ca5e28ad9094920552b5ae4d6f5b0ce8a11faba8e0e61064398ba44756a7a105e41d33f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5214dee0928127423e86c91aa11097144
SHA14c8a4a782332f2accfde7dc78facd94e07b14b1b
SHA25656441fe4d5ec09384ce826e9af52ac9ab1862f3808b8a3b375590b4f83be3bfb
SHA51249dd588f87b724c9e0f78428ccfd4f56cc7d8e2d1b0b9c7a425f37736bbde6d2e88e43aeb86ebed92350127100791b264350210110c3d66415e54a25495d0005
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9a30cc11238b31f1e24d6ff4d40911c
SHA1000177333f9567559215836236d50cab01d29d89
SHA256d9de36b977a21cd547b90567ed9bb6433f79ef1fca53cf0e9363fcb07ec5cee0
SHA512b2af6b109875751d72c5e1dfa0dcff9018dc3c73d37d4217d42571258f99bcfec533c6748b248d45ffed97ce60a1dc094eba680934139514751bc5c8c03124cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555cc1c93c404b14732a0e8a02f5b365b
SHA1c583fc7ce3a595ab9d4bacd5726c847816b07d36
SHA256983a66d96c8e1b8fa434c6a368bb7ab5876a74222b08cce46eb5cd6ddc89ea03
SHA512ab8858019ce77a131f73627a208a81b8cbed8f37f40f02ba7622940bb27a7af109adccb30bd6391515bab350c2523c86b1858a1e0f5b17ce2592f4ff98a3a059
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caac67fce52278473053d721a71d0e1b
SHA1eec451b3f7993486e43079c4813e6e84a11ef9ac
SHA25680187ff88ea42606dcb4805436bb48083288b97c6dec32f91d1f586e6a2187d0
SHA5121777fc8d361fed8b91e76e33fe17e39f775a7826614fe79ba72c8761bd54a778d2289ec393833ac1da17342473219abb3ea0267c2c3be4ba2d2c18ff19d278b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD506c2840511e1f1eb2a54836eef1f5669
SHA1d31c0aeb403b7e60ed39cba4154c398756d2d529
SHA256a5fcfba97b874516a204b72cbeff7f62354ed6b0ecf559d560ef9874a5c4e8a3
SHA512807144237fb6feb7b9c6a760df137e74c73e4bd674a820caf1c57ebca4f3e887963394bad47248d61e62ab543294534e4df72b57e3d5795351847a859ec37a9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a9703e7bbc4868ca725005c84239e225
SHA1f4cc41b2d4761a1f03a54b45dff2adc005143ae3
SHA25665874fc4c221370bd4414f498f7ecfceda3bd4fb0a93bee7f6abed286475e7f3
SHA512daabb9753c958ab4f23df1ad80ae8c18e04561bd695bcd932ce48d2d275cd30eb212538121157fba3431bab306f22c07655d37fd13de69ba2ffda75a4e23e3c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568fc2f7fa04906a27c67cdcabb726098
SHA1df64b4b8b1ed5915e712a857e4180a8b0d0c90d8
SHA25664538396db139fc2c5a53af13ac4bb013fbc7386e59a229a358fb66d58409ff1
SHA51219479777f2d520a97e12b21f9a3e93ab5fd429af51cace4322b8bd62c24500e914a98996da04c41b43b87ebe12f9e5e8b03f46f20a8938a82393248445ac3fb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580485bc75c9f37597fdc50abbf3eac24
SHA1d6b3659075a52b788fa971b2913d184fac229d32
SHA256a2bd3e326509c407373fb3b8855e9717323faa8bfcda2abcffdef47449fe08ad
SHA51284ba2640aa5869d970c0efdd08468ae017b36db5aadf35d38a6629b5654180d2ccb1b34f3b1f202ea09163ace7d16901962d67f2ea28d11e93963108709a040a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57204ce674dc3580fdc9a3e70f1487175
SHA1b251975eecf4cff89c1512c75714b9c89184a393
SHA256cc7bf5730497b45068548c897f34d88ba14924f40a64ce52394794f196340467
SHA512764dc549d58175745c1a4d79a2956ad0ff86da963694a32d7f04e8d53829ad0d3641a6bc87f0b72e514285188cee893415c2f71b2ea4acd3300106e03bc86d11
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD591881dc0f9258939d801f1f7385ea964
SHA12e94876985c93f741fa866ed565011b74415a1d8
SHA256437eac62f86277c458f5ce7ad800b01fdba535d650bc4d08bbccbe171c43bdca
SHA512c87f4d80f0958df7a056343aaa06b46a496618cea5c617475dc2fc77407043e6dc4c8f275a79df1f4b85a9ceae46ecb05c62fd7e70318d19536902c75869c767
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5062106168a80a143891efcee7c50d1db
SHA1d6d33db730e075d2ab3ee8ac63c9a8e79b0a37ab
SHA2568556210402cf229f70b88550a939aea10c65c52176acd5277c4518c18fbeea6d
SHA51261191c4ff7adcbe0d11d72558d0a8cac1881dc378bca773a91199268cadd6d6046f4aadcbaa2daa5fdabba1a0fe68ff5be75457c3d3be78f76cb0e30905ae93f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5378c227c4bc6459326ee2fc29db38492
SHA192e17c4e73ee8dd99dbca20314ffb4630e7d13ae
SHA2566a2ecfb6bcc6aad6daf1c9b13d3a035fcf9f3138b4f12893e4738b395b1824f4
SHA512712a9d330acfcb090b5bd6271f81ce9290d49ce21f37356a88a5d7790c26ba68e5f69f50636359e04de461e8b686785f741c5b845d1919ef5e885e74bf5e3fe5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509de919943676e615ec7cea72783b786
SHA12e77801b5eace6a7926e0339e2eaa65fd0058964
SHA2566e5a907b8bb33418ceac8c27e04cfb9a12ee1d6425b7b668a33cb9a9b919af00
SHA512fa7b35c59c06a8b4fa59e8097525aa7a67989581f1bcbaccebbb9312bef8cb1a972957e8ab6dc9003f02ec45f2ce7ae159f6a623a064ac35f275028c874b8b51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52017732de93d906c3be53dda0f5d4b53
SHA1dedda162bd0e11a9e28e87329d82f3a68ea370e3
SHA2565e20f7bfc79d8509e6fbf69a23d234270c1c2ed5bc6011b82a92f1d8bfec55ab
SHA5124dd252efa77bd4f574472b25edc4e661123c737563010278f8e96a2e7d70668da3071c8b92da7f6269a444dd2ac1bd0c42386160fcd01e5e14f778ce0523f69f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50561383f980de5fc241424eafbb0faa1
SHA1852945c6d07c1dc00f53cb343b65f014b8459bf4
SHA256aa0da02def930ba7afd0bf15d827769fde43c89a8a8311af1aace1ed90ffbe80
SHA512ba102d16d4a717511a86708073e533485995e5b91036a283defbbc350d35d52e0a51377ea4875fbcf09c603c489600dd69ecd925f4b345d83d888edad75801ec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc0cfa1497ce2c7f27e99e44a8ddaadf
SHA1600b848b9a4de67f0805157cadd7df9731fab457
SHA25644a15a827e70199d8e696d8b0e7c41f8eb8ce8f1b708339d2f2d227ad1e196c5
SHA512274859ccbbe7ec70957e74ebb95d5b84012c687dd560c8162630179d393f855baec2314bac1752751fe6681bf18df2a62cae82b95719cb09f05b3f2ca2627088
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5837d3a951cd443b5dc4197cb92630f42
SHA1e494ad38d73da85c9b49639293894ddaf4dbf4e7
SHA256f06b7285b11aaac702f312efb1f2ff78baa75f8c14223dfa86a0cd89094ba92b
SHA512d00a09c99e086aeb4a64a2a411b710e31f1a48c16d1b99b10f582e8074043333c40075474c90e36307d4de7e7d7e3882b74e220303d4f9499cd0dfebb374005c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5301ba37e28e2b00daa82ab8dbd3d3e67
SHA1c07ff7c98bdcab8b0127e4c338000e478200046c
SHA2563544af227ccc66462d09db413ed3b1581aacf50321aea69a7193c02585649dde
SHA51224db63dc85e2724e613714db6fee2ce909699e49cb93e299ae4199f7fb73932b945195414b076b8fb7fff90038f38702b38115b69fd72a5b3d1ce1f818fa1a29
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b