Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
a1a13030d0cedf8179469bd868a9f298_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a1a13030d0cedf8179469bd868a9f298_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a1a13030d0cedf8179469bd868a9f298_JaffaCakes118.html
-
Size
4KB
-
MD5
a1a13030d0cedf8179469bd868a9f298
-
SHA1
2c4e24bb6750bae2f30fc681f9fdb2b8be633b02
-
SHA256
3a6ea1b3eaea3338e2c1a996270ef097f924598843cff771cf58c635ef582bb6
-
SHA512
e5d8956bcda1ad6c73c4d77753e7922bbfee16406c797090293fca45da25c254e2b892ab5139f11e35992a38bf8d39509e18703b80c4280e8115f885123cb3bf
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8okHPAKd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424377059" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00660365f2bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a8076000000000200000000001066000000010000200000000743e6e0da6beee8e90a0aa396ce7d870f3a54d5e69d229231c07ad70cf8dd92000000000e8000000002000020000000117565fc82667ec565bac24e6a8c73a2fccd9fcb1f68fc6dc7237b1c621fc1db200000008d02dbfe119f3d9aaab3c5fd60828b8964e407f6fa4d5ca5e04f9942681b4500400000004852e3c095d70b656bdebddce0b192e3889b7bcd9fa274059a938df2cc39cf6daba2a63f2a235aa6531b042a3a7dc466c713461b8b8ec666299cae6f697dd0f9 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{90300A41-28E5-11EF-B47E-DA79F2D4D836} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2392 iexplore.exe 2392 iexplore.exe 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE 2172 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2172 2392 iexplore.exe 28 PID 2392 wrote to memory of 2172 2392 iexplore.exe 28 PID 2392 wrote to memory of 2172 2392 iexplore.exe 28 PID 2392 wrote to memory of 2172 2392 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1a13030d0cedf8179469bd868a9f298_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2392 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f53e4115f215893205cdfd320b95a03a
SHA19dd316f96546357be45700b92ce2b6363479eca1
SHA256860567332fdd271fd06c4fe40cfd95efac5e526e44aa28724ab93142b07426cb
SHA512a3aa261e7de05c5b5410cf3641e24935429e0fe03c7e182d6ce06294bcf9e2584819884d79cc3c2d1cfca93e269c87430f5433b6e351be573c43432aec0ee5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5be186bb8fc096b9a9e1aae59b699aa41
SHA1b29a8774adc702e63c898d2548c8fd026f618bd0
SHA256a1071fa19d1530a243b3ede14a7693de9cbe136be7c86c10f19dde24f619eb7d
SHA512867d8ec7fbc16a824fed52d197e0b6f5262dabb29ba4afff9c64ab05742799b73ad23087904b90309c3f2d20aef7f3dcba39fee0d8d35a66c2c551bbaa36af95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ec3e57814bab943704257120e32b8e52
SHA17a47de3017ec665429227fc7718b13c6ec87948b
SHA256ed9e5efeabcadcd01e0ba41d4935b0141d338cd3daaf3a580dcb04a2f76fc5b2
SHA5129f7c70fc525c2a96fc81f1aee237e490fa163261918032386a49b45df910e8ff1965435a123fd22f428dc0f0a6bcc591677256ae13873154c54258e894b04715
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c55a7c458328f44e792e0972a73a6c08
SHA18656e87fbf3100a4d32a75794632ade1c810dad0
SHA2564d6d40a645eb67bc64a2b93eeed38b15db66ab63b1c5899486ec93f30480c3a3
SHA51231375682e064ceca0817052c4de56f313d9f84d7cac5a794759b9c8f7157ed315378bd4e13e098d6783f6695f5afbea3da31765913acd9995098d24dcb6fdb43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53edfc5c90975df3f90c892f50b4828b9
SHA1eb87d17f8d0608518b9011d0d8169bdeeea2a83e
SHA25602821c4cf22e9b8a45b195fccd15c883df71ee08867607053bc9ba28d80c3b2a
SHA512675e5f1752beaa011e06d523aefb465fad01304fc655b7ec356d8da1324ade75a7faceda5d425d2aec31548e9a6992686bc22fa1da3187586c09fcef70d86889
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5586983d5e145d6a4e442db74366f37ce
SHA1ed19a5c941baaa978fe6f07229195ad317173e1f
SHA256d178aa54280156c4ca731441e3dd4128fe19f8ef1fbc9a06940a0496a0b0df2c
SHA5126f2563a269b66e901eb953ef687f774f21d663b17541e6c7e9681ba055c63c81ae7389a573e00eda96833a7a7c18c80ebc4f010acfa1208b3eab3077658551da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db4e5cf2d2d4811837e5b7c484ebf166
SHA1c4a09dbec8408d593fd78cf472675384277215f2
SHA256c5e746a87fceba2feaa57901f554052a9e8ed1376c4ec5e2767b73016bcf8981
SHA512721bd4594f818502524a2cd89179ac592a4f85e955be8e91d4e063637802f037bfe16d4d15328a2ded1c01fe5503c5b4fc8aae5d09acb983177f72a798cc19ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD542ad556f6a4e8428e2872d9b677bc00e
SHA104443f0690e8524d3ca6cd7dd473a61c310e97ca
SHA2564b43e15c155bf8c999075d51bb444fc9a1bbfeee3942f3ce9386c0c7e012ba96
SHA512fd4ca4a663bee3e05f935d843183a64030050b97454c8c179f535d86fd9fa990bd94226bc5506bec866d737354b0bbc1dab3b494b0f964ab5c3af3bacabab923
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59aa8947c1b8bf1c6f51fe4c6f5fce74a
SHA10ebe71e8f6497bba440b97703d410cc7ee0a816e
SHA256976d795820e868696179662c6bcecf9978a925c7eec09721acb480b7afa085bd
SHA5120d1c02275e6580a3f744c945a5ef50ed49e73890f62f5786fd7d6b34235474ef2ab7741dcc4c945a669d9e8f283296e07f3154a7669c1ace39437fd194e12e0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d968ad85ed4ff97793781513f63f50e3
SHA14a4b54dd2090c000cb425f2bfd1d472027380101
SHA2562026fddebb05382bafab1862976190b676a3f1caacdfae2f3bff454d90c69cdc
SHA5124cf40d0800ec504007e2601b74bbf3501c4db43807b3a4527fc6ed5cb8bf5edf0bc03df6f8b17d9cbd831af31b4eb9159f14483c72af6363e4d0b55e5f25fe99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f83181e429bbf4f7bda728d21130b05
SHA101391d9618e1d0c4cd1c85bcfa7533f4f05922dc
SHA256fb0490531b12e68cacb3b5f55302d97c46992ac348166e3724a63571e51a2c90
SHA51266fe87cf7415d81c5ef16dfd01e971a5539f8b9281c839f29b106c1c641bf94bdad3f60b282a1e929be1e547b64e426493f9537bd4a79b81430d348be49c5b60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5072d38719189749e46fac6b22efb4820
SHA169ee6a62e93fc354c4fa2326367768dcfef5494f
SHA256433f8f1dfcd3d27eb7655262be85d8f4a7b630266ed006661670fefe17b78597
SHA512dce2c52496d0db6457bcf4691ac0b0007c6fe4e9dbde84ec4442fe6ea0726de55a02a18d44bc5e50419865ec2ba48bf5d080ca88075e0c6f0291ae4c5dc7de8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a328f1c608f01729bf95074eede824c
SHA12e033ad7cf58aa872d42862bf77b1b06e8cf2859
SHA256c70918b3b37eec77f94ceaf4a9aa6b24a767017b72f124a412a63d824d89d976
SHA512be495a2780f051d847454369b2ed0a1601eda3dea96f7f5752b1fa1a608e274827b3f18efb751edd781854f80f112c0e900286fbf9ee5c3b28ee45dbba8dbb1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5696d6d087174f5a94063972fe0590fe5
SHA1e5641a8297634793bbf17d444d4660d79c3c8318
SHA2561a924820403ef25b5176b0e363722da82f823622841dca21474e060f135c8a85
SHA5127a5a2ef33b6e9e22aefb2f1a94a32987f8065124aa1b3d0c6b2a7fcbb0d0ddabc3dd70f1621bd72243fdd1b621ef1cc65c9705b91a14f6b906e4eb2bcfcf06be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f55bbe763b8d304fedb64f3698a2b36e
SHA1201f83d2941776cd3b3a48881210236d6532dd4e
SHA2567e6acb26e17d6a4a1e98f222dc368dff64b8baaeafc05f69d2895512f73c0e6f
SHA51224afc57fa1af8aef18449056ba2f87537175115d45d395d4fcad3ac56c88b2664ea847f956c82da4e873626b02fd601cb75c1b00a52ffb7a656b4d742179f0f8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572350f2961bd139ad2cf5dcd1d7b138c
SHA159edbca3a5084641ad616d6c299361ad5130ab0c
SHA2560150d4087cd745664409241aa4fc87871605d743e175727de213a979a2a8a369
SHA512f1d09715fa3b54fea71823badc40e584c239095fafa6de05d8bd47f1f2e4feee64e7144052530e0ac60a18f0bc46cc35467c77a2acac1b38f0e868608ce17994
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9168350e36f87b6c6d9691d45e50be2
SHA16b332ae19267d03ecd118540d8d3d667ccbcf116
SHA2565a64e6778db305bf1d7ab4494999fd1712c91fad632918ab676ed3eba64a5cfb
SHA512cdc7effceff7585331256a93909cb61fb7a0b6600f6d56ffc95efa7e6a2120cda3805841e5c8a02421e7e4dd43e9959438a9b99e859e886e5e4e2e345b69f448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aac0525e199de6943e87918dc3c1816d
SHA1691483d1124202c8e97ec7730333b67ce787d63d
SHA256bd86f1a023948802aa042d32199600baf404662f431f752f5863ec4dd7a37f9d
SHA5128780f48941bc121afac9bdfa79a03d9995755853465245490e4eea2c20541541635191177fbeb4155eaebee8e481ffbaa5ed89888f0c1c3eb10e04ea4611a9c6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b