Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 18:20
Static task
static1
Behavioral task
behavioral1
Sample
a1b5a6790d09a8b755fc058f1063567a_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a1b5a6790d09a8b755fc058f1063567a_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
a1b5a6790d09a8b755fc058f1063567a_JaffaCakes118.html
-
Size
14KB
-
MD5
a1b5a6790d09a8b755fc058f1063567a
-
SHA1
a63ddf964ab630d7b336f9b48490e09d3d367265
-
SHA256
d366d882e57380999e781bd1b3d8011207d0809dd5afb63526d33ec9ae8e2ffd
-
SHA512
c4922f938b14752478838c793ff536533c7162a2149fc893824a4574446a1b9fca4429a3ce0bcde9da547cd108290336da8da9cf45c619cbcdfcf286eabedda5
-
SSDEEP
192:1Y3dwvKBFPQ6NDF5ByBUSPBKNZ5r3l64oLK363k4sZOGCt:11Kf3SPBKNZ5p6LK363c4N
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000e63bb3189df38910dc2086fc526e890152138372f5e298d7f27ac56379688b44000000000e8000000002000020000000c3778bf652abd2ea13e202c7b1125a151f6840b7e22602081ebc5e151878d4e720000000bc56fa4f9ff1bd7eaf24228c795ba91faf47eeb464ca0de50b6a567490e64856400000008c66a2b314ae381a54fb9f19b95a97660eb639d24df7eb63906fa96226b8ea5fd2f2f55290ef708212e1434cbb5c4af8da811c6fe4df38b99915b18fc0377ade iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424378274" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10187439f5bcda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{64F49141-28E8-11EF-BF32-6ACBDECABE1A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2436 iexplore.exe 2436 iexplore.exe 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE 2244 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2244 2436 iexplore.exe 28 PID 2436 wrote to memory of 2244 2436 iexplore.exe 28 PID 2436 wrote to memory of 2244 2436 iexplore.exe 28 PID 2436 wrote to memory of 2244 2436 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a1b5a6790d09a8b755fc058f1063567a_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2436 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e427418f6dedf93fc368f6fdda3503a
SHA1e587576e368b730b0501a84723496dcd26c1b762
SHA2566cf7520d06afe1dee982d355faced9f5b2ec4252a75088dc4ccae4ee5a87133b
SHA512241de70d38e1cfbde13ae1e223697e4da910c1d40ab10ceca829636d9b5111086ee3d92253aee5f7a64e4fa0cbacf5db80e8366d4a12e8c74ab9969969ab4654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509e6e4ae361407094c95bd5e55cf758f
SHA19aaec8b3a43d05d94866c3bebb2c4d9fe8e40675
SHA2564b6e362a071d5b2e17ac4c4d36d088b08da3d1b334d6aadfdbb3bfafbd95f413
SHA5120be4d2f142e653f34f71f9bf23d05df6145d93b208e1e3c9b8a0dc8b4f7f9b8a5f9bb85032f9b9dcb34bd316a0334db221af16a3a25a6b7b3e04e65a168c47c4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a80a1024d8692fdc782c828e1c26c8d9
SHA1538fbf7de8db02cc1142b684819f835223fe6b06
SHA256e9d63e634a66c07bcef1fbd80871a17810c39c415a0f75e4148490f8a93d1959
SHA512538769806c612e1fbec4fab8389024459dc2d8a7033d6b6a8e539a0cad78c8a225dd33f89ee4c7635710e2c2acfa7c4ab1c59f63bd19f6848f22a0a995e4b6c8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55471b37bbe81408cb9b8219ee08b5ec4
SHA14d042d9b339ca48dd59d8170942832f45580235b
SHA25668b4cf34480d4288b2fea90c222cd7c015ee2d2cd6f4b184536266c6726fba86
SHA512c27aad37c874a9981f3c2488072ae009a546ba821597030ee703c35562bfbd6643ed6288f51743acc34f5797eb7c8c209ee965e39c265462f4710893fcde2fe2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d55c10e6f031a30be4d3029a1889650
SHA167ab461474ecc034817af359d001e3aa24198293
SHA256c370369ff25a9e8615ac6d41591ea46bb3da7f6d756b115739ae5cbae49aa44b
SHA512b8b47951fe7ed4f00023cf07fbf18b0a8dc4ff8d59475af1f68616d56412c8a6bcdf1fd5899c1dd0591101cd6f3dfb30a7564a59cebe2649325cff972d5cae7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b25f7838158bca1fec62e9b1ef1d695c
SHA14613d7de7b299208e07e958366d5fe0213564032
SHA25685e5c9e7e9def725eb8961f02762f85ffecb8120adb496ede9dfa7fcb9b69d7f
SHA5127d037a33e0cdd620e9de8bbb7d31cd73466fa9b71a2d8b8c6cd6fb290142a516af3e3e769dabb1b5a91a06426adc887ccdbd74292e0fc18fa3539a173212919d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5729793ec06a4aa91340ba054d1579790
SHA16fc78016229cd483b3883a454ce78b9dc37a052d
SHA2568322b35086bfbb30ca1e4d1385a64198208ca4e97f65524c27312733f57cbe9b
SHA51202655f4f0b95f864a3e3ef84b7232cd7f74ebd43bcffd792fb273d79be49ccd1d7458b4acc37d7e6e088f0de8984b276c55677aeceab5481736e635cd371258a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5163c506b786792d7d96244cc6dafd493
SHA19abc3efda36874a7ff83e6abbdb2c76bd0d26cff
SHA256d1ad6db6cb018568b77abc22b76f26691fba98eb1b0e5dcd262c74d67a91c759
SHA512a1d989b9066751ec0693400af49f010878227753202025eb6cba793de75268ea71349f4d4f81c4c31129c9a72f8150e6d7a56678b71b8cff5060e6667f342d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e1d169ab7071993691fd1fe4cfe65f7
SHA12e3eff3cc64883f644894dd5cbccb4dc1430138e
SHA256cb678f09a034c88ced2dc30a196d754e695a5118d5af49bef7b3a08df9356bf1
SHA512e1ab5eac4bdfeefd5937eff28adbdc06c97ebc495691d3b9b6905cc192069bc0886cd1cfe315e00f4e285485f0f62a9aa62db2ee881026580f5192d6dcbdf26f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3cd38fde41c5caa7f8f0692191dacf6
SHA17d433a5ded66eef3920bcba06c8452e77b9fa124
SHA256442e135d98594c5d698c43925e867ec17e2a1066ac2f1662184002710934e8cb
SHA5122038f530d008cd79eedf596864f78cecb427ddd09ae00793f54932da9570f5a5391ba84ff012ee91dcd472d6daca0373d472fa1c55c721ae687f86888b4084ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53389ab31a12c792acfa52f74d5e79aa0
SHA14eae23bc81c46b1301f140ab77d468bc8b6686f8
SHA256a48c5f3bc2ad8265367e12d5e4b8d75111a63a49d7aacff82bffdf98b8ddd0ac
SHA512b71d60cee12289b0e7cd7549b22502c6f26ee2bcdced3739e56261eb00ed8d10ea022ca1e82065d01e6d76272f54fe244d2eb80094ad44c30c9cc9198bd790d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558da6fd430d00f778377bb5a69f53a7f
SHA1ff6d10fcf75beb9868e3e2646ed7dfc69b474208
SHA2569235f0fdaa819fe940a873ee2d7487d80d77755f458a8f9a1261a5912133cecb
SHA512ab8564f0820cfe8b2d945a3565854ffccf769bc02bec5bc146f5e939cbc19daf87b1f764776c35cbe8d8327254ce6324a163305e472f29c9f8a158e7cb629565
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e634f9ab8782b66081b49a88b4c7e19f
SHA11ad51a6aa59367eea0907fa7215b5d52d8b326b1
SHA256c6e273be33bf19b931a983f1a83e5ecf66b21a413348476692b3146241d0d482
SHA512123f0f1e3c2337c335bc4f8e669c3f209c32ac6a786bf7a1c52ce6c64872e88650bda2662545e5c5b16a8677bb2f2660f9895e66f12dd693091cb831a37a88b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509da2641f4c601d9263949986901192f
SHA1776fa58e860af88f7b46819972cba11bfd6c85fd
SHA2565a42740e6c73990ec22335c00bcdcf2930f7b97eaff40e219f5b3466dbf1c764
SHA5128e27d6b4a124f1a7ee8bb41ec3ae6499b026e07f7a214ec590d89f84f32d1745d8f62f079d542900b6af878d2c0c4d60f886b0fecbc263a8c9e03a97234de20b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5315a0c0bafadd57733d280b07d886131
SHA15cd464c8c90f78b63b58febf14723a258102d0a7
SHA256ccbe00997a5d05895b7aa2465f63af630c09e05cd053b064535f8bafc5050265
SHA5120da731baf97698494ae36d0bdc8d266e7631b2d89941ae706a0450d97a055ae4de0ae6a2d379f26de417637e4de7ded89a25610d67013a0369437be92ef5f94c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5857d782b89915eaf8082e7259420281a
SHA166f7798b712500f9c2f26ffb50e4193e8d567a16
SHA2561b469f01e14fb3af8cfca63a513f713bcb1cc0bd9279655daae9f8e9d7ec88e2
SHA51244756ea4b7fe002a82ad97c899ad4f60bf02dc382b90ea478c8fba8148073c27fd95a8d6d18185a417e5b665b31c307e87b1f7decfbb31d4d7342bdab367b3ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500f8cd245468a754a83a36fb22b93aea
SHA1125ff98b3fc767507ff5b84b17be6221bd13a304
SHA2563d9c1b2c65511c5a5c6f1d3fdd22c0dea2e233c19a475580ef12dfbd611855f3
SHA5121757f0d2a8aeb0ab0a4e25c50b5ed5201fb55d49a4d20b52892e2e4fef2f57e6d2aa76987e1cbea3fa12cefa009db1ec7a7bfa22e3dfff1221ed56af9ce343e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0a7a14016dcb05f3567c9462c7f3f20
SHA11b949a536edcce44a0f91170ca07a240ec20c6f8
SHA256ee58198cd6f122af8c0b8b928b28541c63c6daf70e8cfcb8bfbed069337243ef
SHA512923a2ef6a7cef7fa098b6fba59ec9bba64d4e6c1644a76dd784e6e8e4cf23c4f1e9cf22a5048fd2d7b65ded1432bf06a2523d87fcce1177f6801360fadf0a85d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD502e95ff4f34f6c010b1ac65667ef9dae
SHA19f02f3457f2dd1fac32785b0665eade4c43ef3d2
SHA256800c547ff398db488794d6189368356f9e18a8988aab1ae290feb4c46279b9f9
SHA512e8b42f658bfcbe4b207936326fa3fba1ae4810311a1f4d3b7e6738eac6825209b733371f3de01f5909116b7f04694dd0535eb98d57afd418e543489827596173
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b