Analysis
-
max time kernel
118s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
a6e8c198409d396f5bc79ed2e55ce596_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a6e8c198409d396f5bc79ed2e55ce596_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a6e8c198409d396f5bc79ed2e55ce596_JaffaCakes118.html
-
Size
29KB
-
MD5
a6e8c198409d396f5bc79ed2e55ce596
-
SHA1
769657a6fc78c173cc0e4456dbdf5ed4a15e42bb
-
SHA256
e15c44422e486fc9cb3b9c984c3f3bd7fa45b6f1ae8353383535263d44f2a805
-
SHA512
9be2672fb24f0a8261d216f6c7f4219aed8f82814881cde59d7a1c7f7b54f87b72613cbc6595c6cbc144ab2776fdb0bbb5894cfab0954f08298eed1ed1a64d3b
-
SSDEEP
768:2gpYR4El02hNfAN8qO4H+CIMn2z2Ox8GpKiXO:3pYR4El0bjH+xdz2Ox8GpKiXO
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424479905" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{05CDB961-29D5-11EF-B9DB-4A2B752F9250} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d060cadde1bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000000b2968c6cf60b74b94229c882944fb8100000000020000000000106600000001000020000000f9f6db21a3ecb60ca34f020b83703755218400d7df13d43aa3b73484b63324de000000000e80000000020000200000005db3ab98524eec52a4e7c715d98142ee661df2b9913d4a0ef130095a5196dec6200000006085160f90adc023a94663d322b3fbb20179b61340ac428455e45592033a65c54000000031e3c0c22ceb787134fd378b492477450cf261c0b676c9c4d6c5d02e80a99e4e035e9630050989ee080e056e7f0d8b13866681807e16e5e9e96649abd0ee89c4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1936 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1936 iexplore.exe 1936 iexplore.exe 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE 2632 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2632 1936 iexplore.exe 28 PID 1936 wrote to memory of 2632 1936 iexplore.exe 28 PID 1936 wrote to memory of 2632 1936 iexplore.exe 28 PID 1936 wrote to memory of 2632 1936 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a6e8c198409d396f5bc79ed2e55ce596_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5adebf8fe9bc22b8c96f18a8613a3b1a9
SHA1ad5bec10c3725c4cd414d7b424b32a3b4f810048
SHA25673e2728fdade5bbd40835741e4597ed7dbef8d3b4ebbb1c57960d08fb2b2f739
SHA512407dd137fa4e807a3448fffac85b835692845c2dac63d2d49b1bae640ec7a6be890593fbd202ba489be07b1d53fbb70efb64ca2d0e27154d4c7017339c205e8f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c61b8d5a881016af9c48f03a5f36a26a
SHA1a2dc13435d2d4ed3be554b3826d67d55d5dac902
SHA256e0cee6aff3ade83d3df4bbc87b976a4403d667422b8015ced57bb4f23e6c3823
SHA5125f033ed2a5b36b8cc2bcacbe561e5ee3bb3356eea5129618db21b74e6a805fba8cc08e35ab94bcf098b43144f8bc2a269f14236c86054705fe6709859e105de7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5149bce8b5012d3a8e52c523b048744ef
SHA15cd2e6805a044ae86b7fac34ce7d5b3a2c925299
SHA2569179ab6a391f9fe62ccaf8e0d60a9ed2efa7500e57cc37c9c65b34a4889b5f48
SHA5128ed4e22e9eabdcf852452aff193b7955e115e9928897c91befc47c2277f6680a54dd73049d68b2746aff13643562246329a1bd1e9d7880282d49f28b4ef5b0b6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53451bb97a2d2e99e3026213bfb8aaec1
SHA1bae6c2c8f01354504f2a593dbb86898ef7183651
SHA25663c00db5ca1738367221f13c2657f3b38cce37faa41f8023457e80f0f86c0f97
SHA512c7c2abc9473dab88818402d4860b43f67f6ce3dd542a44a1413fa591d47ecac0432d937b25ec9c45a8b58c5af47d42aec933db33d75e6d01b0963e8064b11a2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d4a31c7ec64f5134e5210e95316334cd
SHA148acd52efbb4bf029af8fb79db2e939b902e6193
SHA256cf3cd21806c5c29672a7bc71fe2f672f76b496d1461b46b8786cb71d88acda4d
SHA5121c80b45fff080868660aff823ccc73019a6560ad8737dbfaad2b5ee9c0cbf5be9e956fa12aa3548e5760c89262177a53064d7ec71870de595bd4e6d2d874c629
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a998eb97740828fae402e10468e32a75
SHA1d4472f1c3d0d85ac717a8e0486bd699e5f775f83
SHA256517b6f2bd0f6e3cf8c1454f29fcc5d366d7ef688264dd5edd6cd4421d7717509
SHA5120a5381bcaded14833dc84de7b241eb3fca39370da45f6003736f80bb06e7781c82b53a97d18ed57869fa2b826e18b6dfb34de9af765a77329d80eda42d9edfe3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2dd36e009733d3758bc9a8b9fc77db9
SHA1d092382c3907e0ce720d410f49144a42d45b9446
SHA2562de2889ad097e96749156da81ad1dd0603242d634bb4e3c2dd3619f69c729ac1
SHA512fb0e8a47f3b9f4fdd0a15133db0c43ed483866f01f7bcaab640096367d94517525c54531d5a2ba49df5a65edd080643c3ddc8ef7fa6e325acd0562542e7f0333
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc196860a770f3e789d9d032c46db39c
SHA1c9c556eed7efbda0dd9be7e3c1372cff44d466b0
SHA2569aecba8f83e3ca1d0532c9771a8f4cc29f55ceb805611d593405159202b83ebb
SHA51291938d837271b04864104a4b3a8f797b7826530f6e7bb355f697b1f35604429ef5321e0b38dea861262690b7cf95f9e969b1f5e66b7a4913905df299fcd994cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5146e23e9ac950fc3dfb9cff0605c8d49
SHA1807230d6b104933c40ba4e80a6a62a0d03209800
SHA2560e98ece321b367588f6d96c17ca21e9f1a2435e4337e527dc65dea61f84076e2
SHA51250657246647616f95da437852ec87f7fe17fddab38f5eeeb87c3b3862b754e063c606583380ab6a5dbd45837de392f131e405046596ccddf74c360bd5764b95b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f6400ee381fb29fae3082ceb3e4c4aab
SHA1aac9dcb4204891766d6687023980ab3672edfc3b
SHA2567e310ddc40d7abe279fbdf60049d58e0d12762eed6d771421c7acab505ced0cb
SHA5127c0515b71172af18ab64e8630aa8c19b46bcf615e2091a85c74a5f372a8ccd7f05db80b934dea78acb3e1bd8dd9e38901842e7b68b2d1f246f18f105c9a7f79e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e64623704984e8f9b816bdb994d2165
SHA17636e817872a1408f8d68161579fbef7bf2ff782
SHA2566a71a768c2b513c2d8246326216a504cfc56e851d2c19a0e8e7b815ee59b7684
SHA5122f7424300b8532172c5e084da74af5a92f5139ad77ef3f11ba93a94c25aebf1b6031a9e52233fb34ce7ae920e446ef2e4a2eee8ea4ee697b6ed8b4a28005ecbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed8df66e318423340fdaeba51be72eb9
SHA1cdd4e565974288602ea48102fd8bd29501ee1bf4
SHA256ffb49c89e0817cc585085a3e643f2c8a5fc0f9e6a73ff923aa6a0fc02c6f7fb8
SHA512ebaf233ba5e2be06a55c1386ae2a9e9469a34ba56030e8b557783ed5ea89fe3cd33abcd987d9d772877a497e202d656fda2954edb3f6f3a8a1631fc7579388d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dafe53f6554c55fae87d362ec91f4015
SHA1477e58371791c80b137b0cdf716c25c7fbd64366
SHA2564dc44032d20a92c0baf7400881ea2eec791052b26c17b4abf7394f8b39e68f54
SHA5122c260dbb74355e1897c83ac99e98664513b590e6e5f5d85c12000f75dd708b74018ee5ea02b81a2793a7dfa36df731c01b01e9452460eb28175e122996ae52e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f44cd233584f11b35d644439c1033d60
SHA11fd2a5cd4e42cb414611603de39afec146ad27d1
SHA256363b2704f6f45f36d5452b37e1eaa45677e1f24606390a0fd65c1184aa8919db
SHA5123712339b561ee1426d83ae7d6a70563e630258386c8d781c86d50dbdca8c7499cf25dd2143a5fe1da3e485798f648e1b71e19ab5febdee063bdf875d5315250d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5509953fce7ae27f570bd0771d326d48a
SHA1e74592edc216b88d19077b6cb4424accc66bdd90
SHA256a055bd73acb44555ccae7260f895e298d09b350d5370c0f49cbe07c73e3cfc9d
SHA51219631bbeee4af6f64566a7cc69833f82571062580d4d1527a6d1a65d56c4db6dc141bde2402cdece2ba038196594c5fb0fa60727b179cc9af4c6cfd889e660d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aecb8f52ae4b43077f7094b29199a2a4
SHA1d17e49c8e49419218e8adcff6ec3a2fe6d887cab
SHA25634ccf7cb63f99cb6bd59a992d40de09fef9e2808267354967664e787b88a6850
SHA512920dcc6d265f1e242b987f05b9ca68d86636339754a1a7fd6a05cf24d4a09041d7d562deea9b2e061a9cc0a9f396aca8f6859d60b8044e744e35b3fd2744503e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f022d1b84e4523050527c633846d8e15
SHA18b90b6682ec1acec01040a4f831514bb53967d04
SHA256e10b2317325ba5d509148bf3b36fa9b520191ee10054e34817e496657d10af89
SHA51233cfbbb61cf0c33aa66ed0a47a34ed24d900882e1a125f626dd1d079a918a4794da84acbe0f229515f9199a451aaebba83fe861ac41f2f5a3b2fdca43f8bd60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c0167544ae747e407ba0774a2f803d82
SHA126a965b5a8a42747cf836cd9cc942a537a70f942
SHA25675516ff51d35941e61741aaead82987b39b6c0a77a8b3c68e6967851895ed735
SHA512090d7f44b469d13e5a340cc41b9531c1f0e4ded5ab7a62f4b4683a1554e654291dcfbf7f02ee933d3c1fc7f92d35edd2a6ab7b02bea964871d2d1cc6a61145eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb1d04c5eee227a97e23e3d75331d857
SHA17d88210faee366a69ecac040357ffa26f6fb7e49
SHA25636750516dfc41a5fe4bb02cdf92489e67bdf7040475c050ec8307cc8c2bee9ae
SHA512f07e735c46ce881bf299704f2ee5f54efee4a9fdc7579b38bdc22918d876a7473c435e781f027bf999e6d169dc634df99375040dc0d250a0fea3821eaabe16e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a10dd0da9ea62ba0ba90803d6323f2bd
SHA137bab95807906bba916dd627bbe446cf72e951d7
SHA256d87fc95b8c935d99d38632617707811c846be1cf7613751040db9b30f3af9ba5
SHA512537494ba42c65287c15a516d1621d98740af23d7779f654c864e1d0a8f2f775c878025280c1e7b782d1dafc323952171bb0cca4264fd0786384f944598e0abeb
-
Filesize
67KB
MD52d3dcf90f6c99f47e7593ea250c9e749
SHA151be82be4a272669983313565b4940d4b1385237
SHA2568714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4
SHA5129c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5
-
Filesize
160KB
MD57186ad693b8ad9444401bd9bcd2217c2
SHA15c28ca10a650f6026b0df4737078fa4197f3bac1
SHA2569a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed
SHA512135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b