Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 15:56
Static task
static1
Behavioral task
behavioral1
Sample
a13c60b6ec19475e2f0f065e51cfc637_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a13c60b6ec19475e2f0f065e51cfc637_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a13c60b6ec19475e2f0f065e51cfc637_JaffaCakes118.html
-
Size
1KB
-
MD5
a13c60b6ec19475e2f0f065e51cfc637
-
SHA1
d41c85f85923e2ac4cea716863aad1c4bbcb3441
-
SHA256
b40d7cbf9babf0400a5a7e29782c25407275f823fa16ad7ec2e3abad3cc15964
-
SHA512
bfed8d8ec0d2a86d1c6deaad00d68ba575212b62e843fb1b6706aadfb1f09e8caa85b91bea0f3db40b9009234ff243bd5bf58f8a870cdc5037c4b34fb51fc7ca
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51D97BC1-28D4-11EF-ADBE-DEB4B2C1951C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0ff5f26e1bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb81000000000200000000001066000000010000200000000eaebb14c0542ed1c3069d78defb9b4fa697aa314667f74aa835f9cb3f9c2c91000000000e80000000020000200000002d7fd4629fa63e254735afb9d2c8da66d22c44c57fd5e00222822bcd8f54942520000000cd99394ba9221c3657e11760d45faf5f457cb3e0405ccac06330e3779c4851f7400000002e48a8290502b07dccdc90165d58869c9989d48d1623aece75e77f99a227028ec18ac8a4441b011fe8c19be94341ec0d14ac5763d48b069293aacf6c9d3ba312 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424369652" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2212 iexplore.exe 2212 iexplore.exe 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE 1968 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1968 2212 iexplore.exe 28 PID 2212 wrote to memory of 1968 2212 iexplore.exe 28 PID 2212 wrote to memory of 1968 2212 iexplore.exe 28 PID 2212 wrote to memory of 1968 2212 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a13c60b6ec19475e2f0f065e51cfc637_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f35ac95b161395d8b4744ec435b754aa
SHA154fb2f8b13a26762c8581e33fbc0e27b6c8c12de
SHA256928ee5506e8f17685a11bbdc167e459800fac736b6f1a4595631c8b73c0dfe15
SHA51287b6e053edbfc928bdc194b97eb64bce239b14a20762fce0423889e54ad9fd3aedaa129de558464c6207936dd24852d3aa8d4c218610d046a82851f3265166dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD529b763a45da4d07e8f521854270423a3
SHA1924ec43a9772a6cb51a7cc8cef88187922c4f43e
SHA2561dc04cb3821fd1ece58e31fd9da82caaf3e07ccf48e5d2e7bea231374a95e261
SHA51235cbc1a83b472b9160c93fd4500bd5c9f93354d2fe52775612666fa13e9dd815f7ef6d304da0eed43f10e0279c59e0d64c841bb0eba78da083b3d34003d2d684
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54b68a3ca1bdd932b7b8118e46f1c138f
SHA13ebf72a3e761145f2f5012d6bba034f45e7ee490
SHA2561312ab0113b727276cd7c269d7b993b8679de3768afd5579f3a295d91b39a441
SHA512998ce6d65be6da331078ba4eda5515be6544fb5128992beb09798896d76b1282aa726fc23a488b3350af6f4eabebd62729ad372d68e50146e5f88acae0c1c018
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d1ce64ca015648e394e919918bf3fb81
SHA17743655ba984d69115b51fca88bb8f7dd82bf563
SHA25689e092661735072d5757d85dd895cc0b6a95612d89e2a9807f71f9d041e83a5c
SHA51279aa28c62189486b0837473971d7f4638c0e1f8a7d7ad25e6244c508d0569e7a8437431dd01ab47a385fc18e7091c0f18422868bc7588f816b30daca3f99f1f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5960d23774d6d388ed4835785daa5546e
SHA1b80f24f72e2c3570c28a0693de3ab3966de9566a
SHA2567e43115f2fd6a7bbcf1e2db4d1fc1ec986015649c129094973510d08208ef9f4
SHA5121139bbc08835401fe5ed16a02ac5cded5361030beb134d6622bfed15826b09635f301a04580dfc82c55f542973f8c139f5df63bf6825451a21a27649bafd92da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54e8b75648721c6570bc5e89697e4e39d
SHA1e1c5b3cc9e9b03dc23e9c41720f09ec8bca215b9
SHA2560ed5a45984ea08ebd16ce587dac09916d044d83af0b0186e529c634e00232417
SHA512756e859c3cf3407f0cb9e7c96d5177c224a0840e083d4ee0bc9aae0f20000def053aea6d305a17bb8d75ee3ed86767624142c64aa8b75ba10484f337fbbaa8cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f3e1a04df39d9897d879f83773af67f3
SHA17436e52d03f5380c6778956d80445397daf9f4f5
SHA2568ba95b21f619374c4ae6c501b815a1f273b39a3002f45b045590cbe8cc92c86f
SHA512631df82c286433b7e2a427d38917737a2a63256a346796a2cb570ca9958af33315ee169f8843c090c8354c931a1b40e1dce5197d7214f895760bd145ea78fb22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c46c7ea37e5fb7a7a6dd1bee4a7667e6
SHA14bec3cd045a86223fe129952e8a79169ea9093d7
SHA256bbec1671bf49dc798f60398be1db15005c0c4a2ba6a9a5365377136b0791d3aa
SHA51289f84cffe5842717abba5d112c9ab22e0656bd3147fc38a7f62e353216d58cf3c5edf9540b1f89bfd1116686d5f98b3e5483d31a1642f822a8dce7ef235cff45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD596a403bdbb7f0caafbc9300fe26940e8
SHA13532100f56cf58b3b9dac0ea9999a30604b35dc1
SHA256969084a8e9d6362e3eca312a959b5536c81752ab612542d2fa716d76f84bf684
SHA512ffdf0880833ab1d3e5a0711711ad9021704e0fecd0038a7246096db97d3d5943196ea6179758c26b498e2ac81df5b286c2b271dd3039998801e1c287bc3f307c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a58091a7aa0ccb2dfe71bfa3bf90eb9c
SHA12926b922161641ebbf75b867516324f7972511cd
SHA2568d00f00aeea188456038284085fc434f8d0e2b534ec97df992699c92315df887
SHA5120035569b8e7f72fad0fa4a95615d981235aaff426cc90b9831c25772e10ec9c974d58a5824e32b1881228432ed0519a3e011df2aece636e9359a39e9669c4216
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fcaac3d286b15c94ba0ce9e31a5d4a2
SHA19aa046c862423e95454ca7884637e63ce8f6e0de
SHA2562a45ab093f12c4823178b6032de6eea0c086c2c3a50998fd0aeff16e9ebb3b42
SHA51268ee53def3748e97662c04514292aa534a5772028b481e1e25403630e8707dc4b944000fdd48c9550a15bb720e13b3dbe70ed5c8521045d950bb657e45836c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD560c82d835454bcf98e0e9a0350a7540c
SHA1a8e2c01aed111238ede76092d9a01d8a809d6e95
SHA25653762eac3d4632c90424aa52a8c16779aefa28391d344657695c4ea537acfd3d
SHA512db617ab520f8368555d83f4e380a1b2d7dcefd55f83ee0feb2a8344c942a152a93f5ec8c75ec9c59092c68bc5f3951a8bd9167cd0e15b56364594747ae10e75e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b371b64518c45daabbfb70c29116eff2
SHA140ff86418d8918c18fdf7b5bca83a30853be9507
SHA256e86a9fd1b1f859bdbd674ad905814d4085493aee1ba74cc0ace0faebc9e0068d
SHA512cba02f4bf4f394e3cb82018b5e0d87a08f4d0f223130a334feea103b0b3b1e5d15beb0a3c746469734612498fa4cbe04763f3ee9591c85dccba72f1b8ec8af92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542daaa4da9c605c94df83809412516fa
SHA14cea1dc514965a94a2231f6f1268ca924671e81d
SHA25638690a6bd50d3d513a7160c2fce1505bf80d0541cc2f976982b1d3cdec3e38db
SHA51206505f9b78101893790904e6368cd1716b9b18849d5cfa257317eb925d061eddf0dc1cc8f42203b44769894e6348220f098163df031c4941403f36f01c267d71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ea44957a3cfd2655efdfe47ff54a158
SHA136077cf8e1951369915b6eba429af61a515dc6e9
SHA2567227bf4a113f259c866b92bf146cc531cbf94ee9166db003c6a96b65c9f5410e
SHA5124964b078c05b4bed1df508dd5e820b178aaccf511a1277917b18328627eda9aafc30c173057a1c1df0d36c0f9c85868dbc5d261a9e4fb3352e350232f251c88d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed671cb08e9e4484bd73b301f4b4cdbc
SHA1ffaa84501302f6ae9b3568d463f272f3f1d50614
SHA256d0d841b0d780e598502f2b6783930e52c8f71ebf45ae550d68a3005adaa09153
SHA512e918ad2b9aa706b7cedb9caa6d4074c18f0772dac8629521ca6a99c9221913e110ccac9e7524d2298d59a563bd7cb16d4c746a44be6637e7efab5c92aa29a42b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cbebc86e7ac83f5746af41202041236
SHA1dea7ebd4a188ce19db98c749227362a1df93b7c6
SHA256f3b714746ffef2b5d558c6a41acd5f8ab948e8453fc668439831662299ff3f31
SHA512c0b29b014314c9492fe0b5db70aef3afb7c328b9dfcaa9bffae4f29b1bd64b96df9836b2476c07479ee77236b750a5f5b49efe20824e72aafd6fde098be07ae5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50b85417683f44f0aa783ada891eb0e77
SHA11b77e1b7d6a7bbfeb0ad8c27304d4908b6b07727
SHA256face691cfe6c82461f4e2cacc5e70c25992b0bb2b7ecc06c871dd06e9dff643b
SHA51226573a5ab0bcd44c6d12bb3484b75ceaa87c592d234573c6b088c58875d8e79109220bd71619b6e47595ab7102bb5636de8ff08041a3b999bc1b4d3ad2593bc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551d72fbb3e6ea55c3a7aedf5f0c54b54
SHA1e2737a0942502f8df4427bbd74a68b271c11efc5
SHA2562567964c0c028a8c9d5300344ec845690b8eb69fb4cf059bb8ab1cd1f87dc888
SHA512e70a46b83298cf73743f1fb5e294cef54e8150cdf0b1716d5765f23edd84fbbdffab8e82fef75c2a7fea0669ac777eb058d19ef08f8019ce2192fe0435a4c15a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54d67446d8c7064df5c8f253f3d39579b
SHA162b3190a2ed4a2394a4ec19ddf857627d8868157
SHA25678c3570c56fe83dd1ce8ca16ea44ecc1b1598635c73571eca7c444de76c44e6b
SHA51226208a59a05988323efcfd0307909cf648c6fdf81ce6d14d252d2ad26cbb0cc362aec4cdfdb1a3c5a06bb03cb4394e1b67be041b0a097005ae469ac5bfc50297
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b