Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12-06-2024 17:47
Static task
static1
Behavioral task
behavioral1
Sample
a194e8cbfd12578827f21be8fa17bb6b_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a194e8cbfd12578827f21be8fa17bb6b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a194e8cbfd12578827f21be8fa17bb6b_JaffaCakes118.html
-
Size
4KB
-
MD5
a194e8cbfd12578827f21be8fa17bb6b
-
SHA1
efa50b189c454ade8dfa74d59325d91cf7b342ea
-
SHA256
d01b4a329e05ae4575f145fcf5a3a2faee775020afdd1ea00c45b65932b58081
-
SHA512
f133a94feb09c4add1559276ad6972571dcf893046fb880865c90c74370750d54219c1eff41fb1cf370f2abad4268575f7de238df0093c58da88843c3165db2a
-
SSDEEP
96:HxNIJigfOS/uw3O1ESUP48XUEFbUrZp92B/d3t7FJX5yajul:TIEu9/pO1hUQ8XF4Zf2B/dt7Fgl
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424376294" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8C66861-28E3-11EF-A43E-62EADBC3072C} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000006dce9e34fdd540c87dd616733f332e38e36871c39b6d76b67e8226eff43168c5000000000e80000000020000200000000527b7e082db3017f70e081303bf3ca023affb07a0a709f2ece22701e2fb1461200000002503b66f470373118da090c8851f271f255c63860a747f35623651083d37d7b24000000008a2ca674022070d862677f641d3db177cb95a026d937dd5e9bcdfff9d58441a85efb7060af9f9c1cce04600f5572af332dcc45d4b11f5e6186117efa67a1942 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ff6c9df0bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2372 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2372 iexplore.exe 2372 iexplore.exe 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE 1664 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1664 2372 iexplore.exe 28 PID 2372 wrote to memory of 1664 2372 iexplore.exe 28 PID 2372 wrote to memory of 1664 2372 iexplore.exe 28 PID 2372 wrote to memory of 1664 2372 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a194e8cbfd12578827f21be8fa17bb6b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2372 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c9c67baab1099c7891d11f0da8716729
SHA159ee66326ad1f9e4e33fc83cb4432b94c5b87899
SHA25670fb09d413a77bab1043f6bb76dc5c26fa270d41d2cdb3db4712fffdc2b71d43
SHA5124a0aaf0c6412bbd8c211647cfd8ce8c16008ffd6ad8fcf1777c5e6b2f509e8a9f78c35bb8f95cdc8a56607554419f02f257ebae78903ebabef92f4c77c4d9e4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4981950d8d5df07e4932665b8e089bc
SHA1c20a3a718bae3aaea7b4fa5a35c8c71c3c6db6a1
SHA256b1e95f52b93984e979e6cb3d0f8ec56a0d4333a4312d6bcf6aa27239f8e4b4f1
SHA51220afa9e5ebd04ccefa9dd89e028e6fd548783271db526673d8aa8ed5f9e49bcd63ee9fd75e33a0c478277f6492828eba1ed12d0e9466f9be53e34322c05ca013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d0dbb8b963419f0546b5ac78a8b7512
SHA1603940749bc226e2cf4aac13168032647e54adc3
SHA256019049d1c03f987085236acae12ed3ae2c378f891fcd91f3b8839e3d116ffcb7
SHA512eae483ba53934ee72a1c68b082f557f379a3db52c88a6ada97678bfbb4938fc60ee9e8f354d80f443f4881f570f1632e3d1ad2800bd0a8a225db4c26bb41341d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD516d3f18a1a91b4d3368877cc3a026c6c
SHA111977859fd3a60e6334b8767dc39d1b4ca7f2857
SHA25603cc477e359127ee45e02c9ca8662305ffe76ff36385fb3e64e01d94c03ef1d3
SHA5120b3f9017e0da1f90a7df55e664e346070bc8e38df008b9a2ed34cd27c023f7d8a7413ed06181b33898299d99bc6d2d74a957ed73401b75c6211f3b82b6c9a41c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f512475511401313ab3a32b3a0a16ca
SHA10d80235487ce1c7d6e1508c8afba033d925b23a9
SHA2566b8d2bc0ce42deaa0094bd0c942874967de65c2a508b4c1b9be88c06e22a6986
SHA512aeac3579414ebadde315d3a01ccba4ab8e4a92150fc882cc3c5f0113db2a0ed8abf2801c79d4e2670cf9f0cce88b3da1aa69c883b82a28f6acac39562531efb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58fd2197ae5a76d4165f0a90820f084b5
SHA19642b0f3bfdf06c7064ba62a7b79e1fc4946699c
SHA2567c1027fee50e5670acea777c15a667c5fcd9551ddbf1e5d5606fc31c81727fd1
SHA5129879bc3dfdefdfc0f30f71dbc2b465111dcca4fd8a13c62eaa37b36683c09b3779d92f19b3534fb1baa49bc2189d5fcdd4a4724177f2bbbc27a16520e52739ad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d618a3aa83b4603b22f262c50b653956
SHA199c52e7219331db3e0818a10a8c42f9b3966c7de
SHA256a657f26f86211250c9d1b640262a4907bb83b283ade4d3693fa2394bd51da5fa
SHA512c26e88b14d1a053ee18f684c31eb56423ae7602620b09253c54e18785e860c2ab38bc7e42bc18e10059a30800b1b008d01d99a7a2ca8ad7390f5bc01d6779156
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55acf62affaf9abc31f9ed4b3d838ef93
SHA1194b1fcd724bb335b86516adc5fe1e86e932614b
SHA256f84f841e7e101738952c561f40eec473e7f6406bdaeb8de6b9390cfd1ef00248
SHA512bb8d6b40d9ca3d9e3b2187a957870c4ef2dc4d143d6b01db206ec73769ed071a08474655c712955ce9629bae718444221c085ab4568918b0b195b0e5dc33fab8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aa6496e368aa7633da6e3c3a11138ad
SHA15cb97fde0b4734065f71c83c6142e80989cc645e
SHA25694220cd21e60e3456744665e8285d189ae97a4fcdb4820263174256aa7e97844
SHA5121d4cf2e4c572e467e3f9b22d7641fc475610f24588932789adb319d7c51a443bdba03a44c503a0bfdb2a840a58cc67f6e8ec268c29ba4ec48cfaed98358c36f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59108bfc207ac6c937189f508626a339c
SHA1ea80e97a9bc1fab2cb4ea594857bc5ed36c8c7e2
SHA2560be954c42f0b606ae8b451ab622aadf57b3760fe45acf575da67d049c0720b36
SHA5123b40413a9ad4f9224e5d2d940284fd81f036d5921561d91379b524f4cc5d01b800df67ed72f75a3d99bcee15dae861d1a24ca30f78e17e68ffb0bceea6b0298b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5270b66723caf37047794201b330251e9
SHA13b9c7127ea6d1fabc733b36f1a8c62c516126510
SHA2567b01be88030d926fdef4b59722bc31af99ad7bd9ed668d6addd50b8b3ab026d3
SHA51217fea294c9523a24a1abb39edca63136d2f83fe4f97deab894294d87ce6fab0d69a3ed9f8a64dd29da9ec5db44c3d23f302938fcda19132f7b074565368669b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c45add8839af3173bcdee1d1664c04ac
SHA1cdcca8864d4c3116c4c437a6af9a445e40000c57
SHA2562ef9dfdf12a5745dd26ecac9efe7061c4804af028e80bcd6934098a6efcc96df
SHA5121ea4ac43cec5c9a57ee7ab5b4686fc6be7c37322ccfbc6a1128a8e4b4c47c6442be0968c997284372e3daac69c057d63a8f009adbcfb1fca4fa0db856ef759a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2ed88fa78db4adca072beae20d65e38
SHA1d5a2c2f0238bc1ee8075dc1912745b41ae221af4
SHA2566a401cf333e3b41e8978772efab5eba0b53409f08e23340ce3edc24ec7016afd
SHA51263fa1de4c463f907506aa810a397d3fa0b5ac007cefa5f8840f7f49d7418e2bb90eb447d5ba41abce0b474b9aa7d8df0956b37ee8ed61dbd8cc0d793552594fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55e9031f4f75cb9cf002fcf351dda9153
SHA132a2863c2eff58c455f9c923f1316b2ba8fa0ade
SHA256a6799788382ad7304c3825c23ab57e2b6adede6a2b483038b2ddafc1795f21cb
SHA5122ece907139294c3575c9aaf6401bf4bd89c66b4f4e9ae5b2dfbc1df4036c2742920b8456a64977d54a9d6a6cdef919cf345216d5452f865436d75e3d01b7764d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD553d41621223028d77eeac9d597b5f13b
SHA11cbd95f1020a58298dd8a0de35254b63373b2a8a
SHA25665f4843cf0e6f0e52ff141ddef5d2aeb0b2aa76cb2a73e98d5ca504772c2e60d
SHA5123134c6d3202cb0dfbe0d74ae54f2b8c3ebccda05b2f2901f5c7780d9e48c95903395b87da3cea0b01f2b95944f4c0dd822163f84085d9cabe8d1837cb699a932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0de17f556edd3615ea558e143372a60
SHA18980275038a1a74f346e98da669fc316b29c3385
SHA25636ef10b9be556c6164d0a63360339c8507955d78db27cb26295d8fe753ed65d7
SHA512a849a4f00a5c05376718af98acea6b260cff7adefacb28380a9e94293bb47d9f5971e403aa66f6bb2bfe49a8bf8b7dc291f36a85a27999c6e4354b94f3584090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570eac9d57ec456f4e4f62715b483bfad
SHA10da6cabe338570302a2acda50fec66a6abfa4f27
SHA2564b065d82a62aafb3754e9ee87f5bb31279f27b019ce44471a7046561a97fda0c
SHA512516f79d6dc8f0adacdbc8f0945bf4fa38b4523e0c7eca1000a32c9c6ac307389af8700760b51844b36f3c5f92850c2c3d4805bc10d522fb9d480d44105e54421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518d8f6009c665ca70c5a7dd65f601ee0
SHA1e1fb00d4f370a6eed792cd4e14495ff20efdac23
SHA256c5e05f0d564925265c9f3d5d99ae249d82808e8debd20339f1b1460851c1333f
SHA5127064a2e08aa11a1a020e9448137d6daadba76f603833fe50e779159782874a7516a0b9f4757dc094fe8bb7035e19cc616a0f2e1ecd55bf8f67b64f7c4de6b383
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a92a781f09343d884b342aebe14a32af
SHA128204f859ea91c492b8d2657e97aefed0c50b5ef
SHA2568f9917116df53c767627b25e7ee9849ee3ce93dc8d94a69162ffdeff6deb71b0
SHA512840220eb8ca1941b6b6a40179101227df0229778ee4309d15d8e3180e973147a27772f40842f11cb1049167253457824cfbdc362e3b9a218823a05520c9fe14f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b