Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
a1578f3e1c64a59d1ad3384cac7859cb_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a1578f3e1c64a59d1ad3384cac7859cb_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a1578f3e1c64a59d1ad3384cac7859cb_JaffaCakes118.html
-
Size
7KB
-
MD5
a1578f3e1c64a59d1ad3384cac7859cb
-
SHA1
7da1bf163bdab2efae037b9d5732c12d292b1247
-
SHA256
7d4a71a6adbcc26f2b7a8b64664566a6e562d5e6460c124ea436d84c47e2fbf8
-
SHA512
92f0770fd2f7110fd55fe14951f2f702cd269572a3d10a23a4eccc87bf0a5be808d3ebee0af409f04f71d0d35b0f755c5520d04c38f6d97be500b3e34d0c6e36
-
SSDEEP
192:iQxmJMiHEh9EhCeutHEhEAKEhtAKEhVPBV:ik2ZAgutHVys3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424371797" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4E7E3151-28D9-11EF-9266-767D26DA5D32} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80924e24e6bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a80760000000002000000000010660000000100002000000009edb468590e2cb4e01f7aa011893d678a9e1736756867a3fc21f2b4e7de0722000000000e80000000020000200000001e851efc11bd8e707e82336795e496435987a555ae0bcdff56565f357df98f8f20000000a077669b0b7c21efeff2bac9cd18614356d369bdbaadf99c51f550918ce980e740000000101b4115c63e10125bd0dfa7c8160f712d910e74df4b8e3683280224f5fd5741d0527b1f1941145816db29ab2d18259b1683cb5febd49397e2e6f6cef87c4faf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2840 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2840 iexplore.exe 2840 iexplore.exe 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE 2684 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2684 2840 iexplore.exe 28 PID 2840 wrote to memory of 2684 2840 iexplore.exe 28 PID 2840 wrote to memory of 2684 2840 iexplore.exe 28 PID 2840 wrote to memory of 2684 2840 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1578f3e1c64a59d1ad3384cac7859cb_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2840 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2684
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50933dce23003767cefcd1dea16a29793
SHA1f841c9b5a98db266aa4b2067aa33a7869a9f3eae
SHA256a56d6613984d361211994b4ffa23483c9f57241aba63d6a85386b198f8a51cd5
SHA5126d191851bb7877e280dfaa3fb6977f63e4c54da99b9a265c4f6c0fa7c5ef033ffaec15abedcd63c2cda63330c6f04523da59ea900e5a60b9859cebf801e3dcd1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5856e2ff0637d9a71ae251120617fbcfc
SHA176bd07aa518e8d9e154e08421213e5dd80aa40f6
SHA2560913def66e24f02438793d445341377e66700e1307b93afddc6ef9954c10ab19
SHA512f978ca99de80588bc7f7cceddae333742cdd8c4a062282d632e4b55c3c88f7c4e24225eb2dc89be01b8eb783f4e1cfdf1c69af5a1af5df4af5b1a6ab4dfff82e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f46e2b74f604d1324e385bf9366ef68
SHA1ed376114125c346c0ac05ddffa180c603042da5d
SHA256944f5578e8d12e1a956c1d7c406dcf8e3686d0de3539709059122c97cb9e3f84
SHA512701874f4c40c2c5a03e3c3f69a6f9d1e32b194dc36812dc27e3567d719782d21a1758c159393a9f51fdaf786f7fde089cdacf37d9c3e00d4c6d6ef16613a56ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58986f80303ddbce2160738efeebc41bd
SHA118766913fa38853470c01fb97ecfdc7efa4ce10f
SHA2561a4eb1aec32a6ecf8d7a17f722078969de59ba4f44a84d3f46d6e367fef54738
SHA512cb042b3ddc9e2516f4bbc2dbbb104a16d1552376e0842f06b8bfd3de563570b4beb280b8d4cbfc97bd358a77e4d403c1ca05a0b33093eb2894820adb968f0a5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b74e4eccb8ce32a28cb8f5f05d45fb12
SHA1cc2c793b6088595a0642b6e24d71d09f745809f7
SHA25684f998e4f1aed4f91571e0e71dcb71c5f486c43e1e42903198adbc6b87a0a4ed
SHA51209a05e04c4ef4ea23bd5fb80caa44e5dcde45ed3e7cc3351338d3f46f4096b08009a23f496a331e39dfc8841d07b233ba07340cec8ac88b331a0aaea37fcff4f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c078df60aec3898a7684fd5089fa49b
SHA170acea626b98141f7497dac767748da1c2127291
SHA256b586e46c3a2a0f034df64f5216fb050e8975567678eb8c09e745a68c6e76f9fe
SHA512f82d7d65d8ebe345af0f085064b99c0aefaf9a00f4f8c004321fd4ad4909418ff9792aa59583194a31cc5c44ca96b08a6fbb9b03d80c4dd1cf86311a1964b9b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19631bcdb76c550931c8a741026fb82
SHA173d3304e1d37c186cd04a0c17434d2b750704198
SHA256ed373c23694f40560b918a77f4d8083fc4106247ab86fd54f3b99114df405ef7
SHA51224cb01c0a9889ac0edc4295a764e6e2f41eac350f6cd9b626cc3976631eacb17c86ca33fef03143770c58ba9f39e880691af482e78ffb366f005169de1fc01c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b522e95eeeda661f2d68b495167b4dcb
SHA1c5c00a9c02493fb760ae4b181d7eaa8bb83d96ad
SHA256c5f265568ba365ec03b44d39dce22ab66dc2ce114c19defa12615af3a3e566e4
SHA51282ee8343e452d4f0d6071c5503ee5724874029caf35cdc2917ebf9afbad5db1982c39c49189c0e2138b3920b884017579f8d03757e39baebd783f35d264230ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df8efb882ca01c7caa18b02fca9101fb
SHA18714878d227ecbb66f98d4af3a548f28e008aa6d
SHA256b3a9842426e55a3add49b0f237d9493e49a204c066746248a0c92a71182dfac6
SHA51268fdc643e62beed98be50f6fcd71f878b8d9b2fa43b4f326d568ee3908685524753c089b043d1e6bd8087c683da14757b778a407ad445ded4235621fd00624b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c33f0d812a1791151e4683644aa56e
SHA1fe1f9a86613a42b6d43cf923223788d51a0e2bbe
SHA256dcedd0272d6dc9f1a75d2178e3682c2d0aa4246ba8d9b953a754ff38ad5fdfa6
SHA5129c3b1ee9a86604c7e02f800db28ffab7c8b847fb4e3bba2a7d36e037fc9d1c668207cec6d954f41404f7095f481d8558db86084b95699315839b1188a7269ac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56faf5c3fc04035ae7cc71291e51b1f73
SHA15a0eacad75a038bb3133463b95fca4905a5b49a3
SHA2567bc73f9502ce1e2ac413d5572cb45e896528eb05a9a324c36e0b6ecf2fadcaa3
SHA51283d43d929338164f54e944c32cceafe2d86d661ce7251ae28f8220eaeaf3fde87c443f37199ea9b67f8a602978cd338109ae8961d338659af754b52126775db3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59062a3ee7ebd5044e9b27e81e97f2920
SHA1f9b0ce47b72882907577d7dc16d3d4efb26918ab
SHA25694b997c8c6dbd4e96f6f93e8d85f250d61ecd05bfdcfd1492ca93ada7f1df853
SHA51297b120f3987440fd6a1785c88c53ad317955be5412380b1e0623f2da51c50a54988b4d1afd72e8f4acca61d6b15f4a143104b9cbf674805918dc5a5c824f65e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabede08c0d088b6d6c4cef73c92da0d
SHA1c753fc0812fcc81e1618e58bd4e1e503d6af7241
SHA2569a485e06eefc8eecc7d1326584b20aaac762addab5daafe21b14dcfb5dc9b42a
SHA5128eb00ba3e8ef2bc458cdb496d77620b032ff79185bb966837bb9db534aae2850f226422d82a6c02727f59a4d5d2fe7ba589e5db61f4a03576f2347f073924ad2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a342f9a6f010a2d2514eba7a6582c596
SHA18fd47b4c878cdd74301a252ab947b9d716256051
SHA256944461055d4ff15252d4aba65acbb2535f77fb7117928fa52f493d9ab57f522a
SHA5124d9a816fb7f343b72848aa4b6d14df91b57e47fa90c779525bba807a69306300e3c6c7a42054c3ace19d875eaed7ee70cf65f7131d1735b8cc1510db499cfa65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58887b2f1ea95bfa239e9bc479e5fc844
SHA16b3604e8aae589461b5ed79bbd5b67564208c90f
SHA2563e324ac3df5d38494be6ccbe79d3b9da08a05be39dff8c8123d5bb3a22a60161
SHA5124516c955008aa356fec7a9963dd1216b6a580e7c5c708c020585d68dbb3114ce3ec4dfb579b7d3f6c7dcb763e15a33a6e5c1f2c95e2e1177fd23340c86ae738c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517305da844118f0ce1ac37130b3538d0
SHA1e30ed14c73110a400b2bbc14f66137f361e7f08a
SHA256b719776b841b1350fedc0ae97a1568ed32b8920a8670143d2b773a9542d32d7a
SHA512136f421e1a4753cc1847161d08942579016dc687b51d2113131c917983db352ac23d4bf6b846bc46950ebf386dff920ea6935b9f4762a528a5ffdd081e179c6b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD532705d123c18f4b22446ff2f0bbe2043
SHA11e9b06cd0e842eb534a3e082af16ec8427cf86a3
SHA256f9a225c2918bf6d16105b0a1cf4fdfbad8691180450ee1de5d793660c37b413d
SHA5122f3ce3bb803974ffe08c2c4b07e55eb174c6b709e97bb2d7a7b61f5ddd62b1e0159dc44de6c1467124b721b589279cb294c4fc7c593645f990f6a1d0629452fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e8ba1359c79fcee594df14290d40697e
SHA19e2c465cf73a09f3913f12ff42b9cf1f4648846e
SHA256a9a32dbf6386952ec678b5e0fae793a90fa202a99d704ce53c391c4e7ce9cf92
SHA512110c8f73737f89c32f358c6599116f566f0e29fd4a8f24a12f5e65bdc9237561bc5f0e87118a0524d510d041659276b28e1be5f54d51e20f05f460b33664ae51
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cd3aacf59f474bbe4ee6c67aa68e45fc
SHA1eeb66b9f1c159a156ec0458b381c0d95dfd1f5cc
SHA25656fb5431a50150ed848c921bc40b57fa34f048606c4e8e12837f96ec9513db42
SHA512909dc13f9a8c7be8f309b7538fcbb0b07ddeb3bb161e5a2a6a2de25de2c8c3f32e9e26345c1a78155a0efa121357a29e00e23aa01c4be541528463319d9b2639
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\76768787873[1].htm
Filesize114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b