Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
a730d1c2da494b4427a57c5cad7ac53d_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a730d1c2da494b4427a57c5cad7ac53d_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a730d1c2da494b4427a57c5cad7ac53d_JaffaCakes118.html
-
Size
45KB
-
MD5
a730d1c2da494b4427a57c5cad7ac53d
-
SHA1
63122df0b74ea9cd0ffc85cfa64670312642a4b8
-
SHA256
40b67b4043866e096b4bb9ed430bf5791af49dfc138b3d6dce0dd8d758782f54
-
SHA512
ead2928fee02451af17930b4ba7dc0daf5cab60f311ed8ec209a060146127e95c59c69a141b1a97438c988159a6a70d1373f41013e10ea4e3992d574e94b4041
-
SSDEEP
384:ezgrcO+BMkBMeBMTKz0SdpNdch/CHfLSdpNdch/CsLGQXSdpNdch/CdTtqUSdpNc:zrN+CkCeCETLGQotqcrpnI4W8iFbiq6l
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000005ec80cf279b2564c91633e21940a807600000000020000000000106600000001000020000000d2f645784e166de163af8f30c4534d2271cefb2b239c0ce7d45bb428f128624f000000000e800000000200002000000085b48630a3ea13a6c84c6aa94cd8327a8e47433a439fc7cc774c185638242303200000004e4c8da0963ec410a16e0d9c836a4ebf3544fcfdf09550360a9568da0b40926440000000a77caa5e813bcf4df27ed84277e59b0a10ef9471d2a40f0c03a1f243b26661e575578b87c91be5c2c6af0c44342dcc1e29f7d785fb860af8aad055e9b30394de iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40251fe0ecbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424484635" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{087AAFF1-29E0-11EF-B918-627D7EE66EFE} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE 2360 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2360 2440 iexplore.exe 28 PID 2440 wrote to memory of 2360 2440 iexplore.exe 28 PID 2440 wrote to memory of 2360 2440 iexplore.exe 28 PID 2440 wrote to memory of 2360 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a730d1c2da494b4427a57c5cad7ac53d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD519d0bb469a286e36e6a4dcf185af6942
SHA1ddf72889df6e8a69c8d2afc43d392e59eb2f3779
SHA256d99863b6a803bee2b104e262b5bb5f3d0cc898add3fbdce9b787da39ec81b86b
SHA512603912385b7f199038f39da5b790688395e1446e9dbb86bf2d3d8ed0147cb24656bdbff69449593b74c1df291a24714b52ae981fc02deef5eca91771bfbdbeae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525c5d36e0dfd9c046ca0883bbfdf1a84
SHA1580f97bb10513e0c6ac8e60b6942b5a3e033e0c0
SHA2566d9b4a1cea1d863d5423f2dc26490e409c1abc9b6c3fbffeccf837402f32092d
SHA512bf0b77e2ebcc4b6ccac7772f32159618bf801ae798d4eb05d2f4a8d87b3d5d97b51f937423404eed77859e287c0ac24b26fe3a39b0eea76a0417ff3b7aba29e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562b12ded803a7ea650abd24d773dab07
SHA1cd0178a9717108c052498cf3b28962b42185cc1e
SHA256bf3a016635b3d439d6b60b7aab04e27868e0bad59887cc349ee9548406cdb189
SHA512592c1b91d894e27bf9ddf624db74d536612456ce9c80991fcfa013ab7fd4eba43474f4ac4616a40c0eaaf0cbf9272966928fc4a08227491be01bc48e58f8bf13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a62819781e1e23fc0b280eb72d9a15fe
SHA1078b2c8f9fff02a2b7f5dfd476e10563311ee4bf
SHA256ae5a665218ed4c3cec5d269a2a791e8a3cc3ac59c2203c7039052f0bf8c41d81
SHA512ff205c92733de2d69e4f8d8b6beca78e2f01abf661c0b9515917fa658f63faf6a88de14d18f3e9c795dc913444de4a662f088275d9dd03f9d22b9318b8c28d50
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e2532a68f61aa507a2030ff3bc6b5e7
SHA1987a742526295250c846895230f305d32a03aff5
SHA25697bc41494c9f7130ef91361b055687f19de2048dff217e22b5f0b1f441d99aad
SHA512062cc07944e05a9254ceacb30f1faddc74ed5ff7c708f3ef1963ba300b8ad6cbb54cc562a72a7c03b4f9a746f18ec3d2d966157bb220a88bff3101ca9e888ba5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac75606815595a1a615a5f8ac8dec097
SHA10263eee1d630b092035faa0de9143bd9aeb76e7f
SHA2561bdf3f45c4f6ce426c6add728a010557862631bcef0d539ad588acdfacf49d8e
SHA51209fd5c9e2df71aa576481f33b05e53a8a948bcd4ea6cd304b741e43ee0481bb6b10c862935ea63d42d0d61bd579ea43f6ee0ecda624c4365184c68fc3cab801d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a76b5d49c54e75d8968858a9d78c1dbe
SHA14508071004d9d59ef7f3cf9ad34b4360642d145f
SHA25618ca9f99cb69a903bd95a200539c5d8a7576d299065b783d3ec59d7103792826
SHA512d93b81f9e2ffd09fcc0f93a9c2ea43bad0d2eead63d93ac8d471e201a049664f396a9a35c5de7295ae4b9a8b8b380ab211d13aaea099c3dc39b32f607462245c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57391a3f88ca4d072869f8ded1b6a4901
SHA1898fc4726475b4cea3a71d36a15a6b90a5c13dc5
SHA2560d4e641784a37c74cdfe0badcd9ce9f992a56b2d9baf86fdc1b0c85b9a6f52d1
SHA51279013eeacbb6db696c49953ae5018b4b750bb42dd7dd6dfe6adac6a057f56f6914af57cc0a3e1bd592f03a63c5439ffdf0cec7e2b0092a8ae4c5e1d568548fd6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e679cc20d01da4aac54ad49d1ec342c3
SHA11afe1e87db6954362a334e263bf2d30d7052351d
SHA25640db824c1411c6749503b5e4f4d86cf602a9eda75d907956e1551296331cf53a
SHA5123263ad99dcc042134e1c920119f2d941726184ed2f82516ee0bcef2e82148eb70b76c368580530447874a17f47328516a3f82723687f5aa1324f947d932922e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cca8c63c93f70b4cf6bd757264962553
SHA1e8ba5a9e703d3edcfd42aa595a97e19af5826b53
SHA256160e1efb7725ee18e2d4ddb9748a7afbd084910374428c1c2b7f6ef0433e747f
SHA512f6b319eb6eb1f4cc697e3841d59ccfa21a18379cc6c52fe4b347a00f0e6b731b5f631b02503b055d3a62cf55bfb77d67b5560b03745fde6a642a9ca19e278490
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD569236479f6e3191e8262bc43413ba9ad
SHA16ce1791d484c89b4b59f3c25d121a7daed0752c5
SHA256164a531766ee6b38bef0a107ee87a6573d56d058551e857b72e264efa8a783ed
SHA51221669ba7f71bf6b655f1d4692f7cc4af533859ea2d3f07a32e0403bf044b9b80fab297815e47476a0cea8185ca9d95939fa795e56e07fcc81bcead90994b403a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555f23de4b08485615634732c5d71c840
SHA1a3e44ec01cdb9074e6ac6a26863da132e53b5844
SHA25646b24907921273afbcc0fdde72477680b812e0822197b7f29f0c9965b883adad
SHA512e6544ac4fbf9631a78961ad05ee46f4fc2d490109004c5e87400516b5856a92429cff1f5880e470e74be6169e88f492337a2f7d033be8c7a2a8eb92eeecb2f43
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fa903ae224e3311dec9dc243e9aa9b6f
SHA1d0384b17e170eb410d1c421c821369f65beb03aa
SHA256218249e49cd3779e64a8414771b0f5bcbe23a8dbb3bde7ba07530a718a917ae0
SHA5124be967aa0fd5ce074ac82be84d35eff5d09447055c8faff7fd1c9b75896a52aa542e78d1d319a5b9331fe1a69f5e02da9a10c9cf053998ad3fd1e772a5f5bdb1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dad36f4488dd07298e91bd1eb58988e7
SHA1eaef93a7596fa48ac44d0924f664b306a55be92a
SHA2561317ba2a907d090d93ef9948b987a9219bc223abee7b51fae9e320cac792a176
SHA5124bfa3d8d0945db4446c26ed56cbd1c0130679d58177a5b1a490f1fb06a576a385a82b583ea0cc2cfe879b6eb664da607292c381068ecdb0b77517c4bc6e899a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59b422c93b25979fb2e3fb36b18b2b8d5
SHA17cf4f8ab531d70dac62a3442eb2a16e2bbaae2c9
SHA2561ef3029d4773ba0e3c82fcd73cde4a1c0eb47431698092f20b2a8ff26f7eb7b9
SHA512b2a16cff96030472c686ffc3c768158529e0011c134108350ae0818c7523426e66a9964a5f2f50970894a1c056c3d6480dcbcf491fadc9170b275f8853f531f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5021f03e3b82fdb875282e2c21c042153
SHA1a93455377bf66d83d12ff80474b7c36675306187
SHA256fdf0963fda8f6e3979f918712c3573686b0e716c592a3d5ccf138edfe378e150
SHA5121a670ca9d3a8583f9ff4dfa08882ebeba117baf5cbfba9ae6d37deea1a48bc787e03d6334f8cdb8142299e2bd546fdbae23d04ce56d5808e7778f5423bc43287
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58610f86580792c57333f2c773aa57c71
SHA14d004edc9e9c834947bcf3d998a63af3df635ddc
SHA256107c01a597d3fcf2aa27ac55693dbbabf81134fd746be03639657a9e68e0e15c
SHA5122e2b931fc1e1c98066b33939b848019a1adcd98231429874523d2cfd5685e5103762ed64d41fdbf2c987ed72f1bad16b1feba1b137453e14b246677890a28881
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5370fe193bd08621b0d3925fb129c392d
SHA1b9e5741ce88dd9b958d6a24ba2221267f93fae3b
SHA256cf754a8fe9c6801fb5f70725d974d11b20a62def90ae206a4b84eaabfa91b9d7
SHA51209abb0b0b1f25bd373fd63deabe9bc22a704e29165cc9a7aff3c893e2c960b52fe7839f2033c535d60300a39864c395c6e739529f43c40d6082d07429bee4c49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59e2d87a4bdbede47efa48a6a678ca87b
SHA15a8b12ae1479770243c19be3eea019498f91f61b
SHA25642d7a6bdbad2d9ab1aff16802c806c09849e8c5b7ccebf516e39631f0f7d3504
SHA512ce011e32413e88b4ac9cff98b2cb84d5e16a52b4daeda0c8cdbbe0de9a3700d1a32f4de85ea0ea221888569b71e2f8ffd2a67bd055dca0b7fe81e5bef414269d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ae51f34f481cc299601711ef991fb60c
SHA10bd3b6093ca91f78da17cc725b361722273f3ae2
SHA2560e272828950b12bf4ebd20583b791193b379fed7d987988bbcbcef26e041af5a
SHA51231b5975a2e5136c7cd6949ddc40202068b0c60837ad265ae68013b82429e94b5c1d95f45293dd6852dbd81dc91985262faa583c585211a6337d48b7e122f0691
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b