Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
a33b861c515965b0ce005180e977cb45_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a33b861c515965b0ce005180e977cb45_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a33b861c515965b0ce005180e977cb45_JaffaCakes118.html
-
Size
461KB
-
MD5
a33b861c515965b0ce005180e977cb45
-
SHA1
f697c1fc165f8899799bd95f494b248613b81fdc
-
SHA256
233db31aee88a8c3b458f383a372c554ad655f567f0e14e3be92f7b927591378
-
SHA512
845e6ee1a72ff8a1b362323ad410657ae87921c3426f8b37378d42913b61fba5f0f4ef0842f6ac131e3e5bcd2d9ae52ddb4442cf8b0077dafc85ad22274181fc
-
SSDEEP
6144:SzsMYod+X3oI+YZzbUuQtsMYod+X3oI+YpsMYod+X3oI+YLsMYod+X3oI+YQ:g5d+X3W5d+X3n5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD144341-291E-11EF-A8CB-6EAD7206CC74} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000008d823c2ad014d4aa5f4e9a4732f8036000000000200000000001066000000010000200000000cec06635eafa215726f4836e988eee7a38240db5c82fa1ed3ac1557263e9c85000000000e800000000200002000000080ee316c1db841057830581c00930b55f9477b2ef995ded80686a75f3584c52420000000ebb69d5a3480b538ab4d7cd75a3bed812318b6abfb04788d3dd31b711ed3ffc4400000004a5076d596e5c1b3f00297f69b9b316e684abb5bd1d367933c29275d7c6d690d753593dc11e1f0a929c9db99fbdd529e8fdb1be4abb8b3d897ced4c0499b15cf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424401722" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30d4b0d52bbdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2220 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2220 iexplore.exe 2220 iexplore.exe 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE 2092 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2092 2220 iexplore.exe 28 PID 2220 wrote to memory of 2092 2220 iexplore.exe 28 PID 2220 wrote to memory of 2092 2220 iexplore.exe 28 PID 2220 wrote to memory of 2092 2220 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a33b861c515965b0ce005180e977cb45_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2220 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD505c85cda0c1d410d7c33e5e12c8a5454
SHA191f4bbbac99b3dfa9dfc8f3241478a5b1ba5f5d7
SHA256efd7b8e3bffddfb4408f82986a102ec70296368505ac3e3b4803d6505af291ca
SHA5123a4372fac107d58af869cc47fa1f6f8939f8098f6a958952c3db8a91bcce96802364b9294f223c1c148ed8bd86d56e8778392ffa37b46a65da1396bd6250c085
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eeffd8c3f2ea05a41d9eb42c38c7de07
SHA183ddfb96808a6d88bf3195f6da7fee1d8805df7e
SHA256167620163468de46474794334f74c5de999d24ee3d2e3bb67eb641ef8ae0613a
SHA51278493a8597c9331ff7225a45b28028e49530e1024b9399e61098e06bfef86b85af7ee7fc8458df2a667308d33f9f5818a7966cd7c067c2f12e6731a71fb56413
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5556a5f9b6a9c6bf600a9cec93ca20399
SHA11d479ed5d40364454d99866a05b6e512bfee9933
SHA256790a5c945090a539eed51c61eafb78ad1a5a7d7f046b75a698f5da33f3934621
SHA51201833793875f49f654c13724e893fa52a790c833e5244c7da811fd15b816d3d2f433c870e6e893fec07d6f9b9f3c44c9d9b95ca4b35b421a1f48aaa6d8399e2c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5987c4e5efa1de2ee0e66529dee0341ab
SHA11b9f7a69f539a9c193ad5c36a99e2071dad674e3
SHA256e1067e8143e89a13b2581df828deabb290057f13abbcec7d1a0151fb732cf2d3
SHA512ab509fb2c2f6ebd4cc8c88a88a27609d8d263726738cafab6bf70ba7496e5dd841af06bf120e71a56bcca24795c4e4ef469f976dea257c52bf15081af338264b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD578b58e41ae6a8dca0ee1d03087985a44
SHA1314c92df884f49095f96347129f2a730c09d63f2
SHA2566947f6825bf79f3d013220262f61e4e330008a42afb882c208ec651e77fef99f
SHA512dfa09185d1fc409350f7f9b7128ff77b8bc84bedf933cbd1ccba29b54be19d41de2bd2f5a7ab8b403ee674df4a4318b4532bc9962d65a9c93c79bc5501686a8d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a038b1400ee324006992058dbcf1507
SHA18b52b14e5c7ad6759c74dfcfde6408f660c33f72
SHA256c6a6bd0775e467f7b522b3073baa29a22e31dff61ccf56a00334b06eb59986df
SHA512b983aa565c015f04c2ae5402b2decafc92dd9188a04c796341cebcbc6cb35a919b7f455e725e8d9a450af3c9be7136767edcafad38c342f65d59e3d18f2ec363
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52777f5f7dabaf669c7f65563bab59a1b
SHA120142a572605f1080bdace4344c2379e044cedc6
SHA2569263c6f1473ba4f0f52f2dd75f4b1387ad2ebc548c3c2bdf1c0f7e1780813099
SHA51267a064977375351db5288a937f2076a51aa6ad5e1027e661612072f0974425522e5d98a147df0d01f30e0c455d549037a77f2cf8787c74fe5fe2c7427bf0afb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57190cfabae11c7c013724af8e6447152
SHA1b73a4f42fc8ddbab6573a98626036e10f6aee568
SHA2566d52b53918ba58e6ac312a2cde017d269d538d7b5910f0319ccfd9a171d67dc8
SHA512745048ed85b2e79678542b27e038c17d9c2420324e3cd4bd16851eeeda8350294950b49e406e0966f20006a1b9739e20a94faeb7d88c3500380ace51791c0b82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58046c0e7169bfa1e0380ca6caf74e643
SHA14480237336dadc926cc7385ce4730315be2dd82f
SHA25654946da9785fb005e20ff4b099847c9b9069b16cdf23fba34da61db6e2d39276
SHA512c875406ed2b678ae67b2b0e0e5b4015af44fc48f6c252c8339c934b27210314d043f0abaec5642fcdb5305c4c991634119acf2e59faea4d4a3c4fc530b2649ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f785102365aeb97bfa4fada4feeff3f
SHA1006fc5624dce53dcaf9d2d815d789c5d5e9ae674
SHA256a243fc66d10800613f64a2437397226d32389fc7c45c0e3a39ad78f599d2a1d5
SHA512a8d40fa8a68616bce3a96585e047039bb439743b800b1165d0497a0d24845c03be8e7dcfab2db254f3a5d7eed9b89b1159814c1ce4e079424dd0e6cc4dd4a585
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb56408ea33e4a2f8f55c25dff7ddc9
SHA19af0f7ca49d5d310c2ce28bff7079cb2f834d999
SHA256765d632e559bea4319d6a6ef9a9ae75841f940b721f4c4bfbd6f369715135e5d
SHA51254431df2c8f788a8a4a4b41e31f87a9c544b440041a21014272fe747b907facb664f7e8745abe0abd1a946cc561f021c1470cdd27070bdd891c37e564d96660c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6125c5848fa014fa72f7c5b6018758a
SHA1d8d9f98a2a8eadaa29a2d4642faf719d6507cab4
SHA25671e7dff77be7f76a9b3445ba69a9abdced8812d427a483435f389135567b5486
SHA512862991e8c3bd96ff576ef8b0d97d0204ba65e81dc5eec563c6d84d9cf6971bb37c83ca89153df2f4b3ae4fa471decda87f52e6e98993633201c5c837f4bb846d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD555174d52a078637d7a68ab5b55635f43
SHA199c0bc6ca289a000627151807c114f8b1a2826d1
SHA25611163aff1f8a71ffdf54f493fab972ff1f46a3f9a7256708853150da408e5fad
SHA512f9f545a14a181a6be2207a15906449034c38fd67f1319c39f39030cb4b90f94351dd74a48688a6d684a4e31c8436741795b3719715e0959d9fe6974e6e431e85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a882578fe65babfab80b583e6bbb912d
SHA1f778a3c490de940974dcb34e82cbdead9213a25a
SHA25604702ea96ac379124acb6cb72dbe8868984871e81f20669915c013d2ea4de085
SHA51256c575c2b7a077bb11297329b6ff43e6a4598941716d9a7e378eefef16a704c7a736b662a027fa32b2ce82d9fa6499653e1126d752f4024f04760dd6a61f27e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aabe0acd68b0d255c5676c74fe8815b5
SHA1eb935fde5d2acdd9477664d5413b979c320f59a8
SHA256e62def2c47f666a343ab45d753a8b26d25862f97a9f1f110d3de67a6c6197fc7
SHA51249015bffac55bae2ea5597f2f0727724c440439e0c77f4f47cac9978744f296b6d624fc27b13fb0fad341e07413be9141bc578be97fb91fae8bfa41bcd4ca24d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514f88f246992fc15c937a8855757c9ec
SHA1c7ea1b64d6be6aae5badd5f64ac6d88b902a7eaa
SHA256779e7100ffa94ad045931a710738b3d146cfe98ec17820a352e9e9823311732a
SHA51203555ce9046d9b60d5a5c0e185bca6e05db61f85ef257f03a3587b1eb7e9754448a5dfd0d57fe817c14605aa2efe064c755d903223a33a708987b13907bfd804
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54229888c81b76fdbccb25a78306b9a3c
SHA1f67238f583750fae68f94ef1b3f3db6017f83929
SHA2562ea829a5ac08a8c84f9820f1353f6e0fd75da88fa0a479c7aaacf9693f0402ec
SHA5124bf83ed7b8f9d361b10d908267983ea891e10fd53b0db4f65835862cf0e81b051163f249a032ece0320f6be286feb947cdd14edb04b2da8c3bc48c8c3c801543
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad32323bec544dab42cd1feb86503b16
SHA18f41d3fd7b7e7f580624a5515c10367bf540bfa0
SHA256e837127c92b87f7dd759a8dfc9542854db95d4663b9b54067145ec5ae0041b41
SHA512774fc0cf43c7495810054eba572e8d5af516a808904a5a0d42c3d6c020e645e720bd6c880b48c0e3b88edcf2d9132b16fafe7c0caf2ebae3b3fa2c9f0f2875a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518083a31857f9d46c97a3c4fde2536c8
SHA13b22820bd47fa58a127eb47368df0ea1746baa76
SHA2564b95849754cd289bf91505c9332e111d24d19ef66ea7ba25f7124b72f8f85d79
SHA5127e4393c09d2249fa6f6aa5d6c1c099b8ddb11346e4c497a042ff17f398eda52f4f5299921aca387f62c300bdd2156c5b34cb51b46c9dd344cd7409cc38150391
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b