Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
a34fa14508d03b76c323299dee424884_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a34fa14508d03b76c323299dee424884_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a34fa14508d03b76c323299dee424884_JaffaCakes118.html
-
Size
19KB
-
MD5
a34fa14508d03b76c323299dee424884
-
SHA1
71a84788abb3b7f0f40c872a0d7af5c2c409e54a
-
SHA256
308f240c3b97557ea4332326e34e1af3476f78f43c66ee41bdeb5d92b89a369e
-
SHA512
bcf03a18d2dd0be6de03126b679c807dba3d2ee2e50502162be1f6844f1f12d46c966778a88ed0d4f496badda410606ee9abeaa6906e09e8254fc98996b38be9
-
SSDEEP
384:SIN937hx28dhOzr2CsGoqKCvQIYxjywvJfGbw4gmxAXrdW8GoDtmi5:ScdAgVsPYxjhfGM4oRWe4i5
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000017977dd6d6ae324ca5c70a153caafbfc000000000200000000001066000000010000200000009f5044a14bee2a09a51f824c9bf0cc3fd601153777960d8087d396f1a4dd6a14000000000e80000000020000200000000399f89d43bb144dbfe6a0fe231419b97b5959fec0dada9975086f0856400c7a20000000f641d28433ca12ded92e51821b20e81e51a5be120b83adaf6aabb550a2bed4d740000000ea94e0ea242aa84e011d3c860bbe7267cd713a87541b03685fc526079efc187ac384104c2db828f8c93f13d6ccc1c67b68f7235546966ef4f1ad47495d6d6a77 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3020d9d62ebdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{01898F91-2922-11EF-A296-4A24C526E2E4} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424403017" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2784 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 iexplore.exe 2784 iexplore.exe 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE 1984 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2784 wrote to memory of 1984 2784 iexplore.exe 28 PID 2784 wrote to memory of 1984 2784 iexplore.exe 28 PID 2784 wrote to memory of 1984 2784 iexplore.exe 28 PID 2784 wrote to memory of 1984 2784 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a34fa14508d03b76c323299dee424884_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2784 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c8f373952f20eef5c312f3e672e113d
SHA17eed56bc01027206c942161ddb5f2833876f2b0f
SHA256c6d88e85e133db62ea9f654bca64a6f97e94287835a06953a2bb448c91af2e41
SHA512bcd2c631ea16acfe6ee86cfcbdbed73ebbf573cde27d62badf12c98aa03a3cf902ef75153b8a56299ff11cc565b3ec51c2fbbd7d48f474152c5f60bedad92dc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd28c1b40ce1371547c20b8873f6c0fe
SHA1a487a46b6a7ae4805a47d3dd8517decdeb82c4de
SHA2560a28ded6fb623abcca92ded95fe192ae3fb6d256d3e8cfc7a270665d71b85416
SHA51297cc20b9586378c7a2dcc13dbbe5cc293474421c3f474e03140aaf24190d8aa0f40323ce92bfcd084c41c1397da6a0107cb3846141d089c6a1177be532e1ab2a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e6e7d68435496089eea3cb0c736e471
SHA1160fd165b7352e877876078f1ce6baa70db1fcc6
SHA25665f5c23f33fb540efeddcd377eeb7c0b19f8cd8d633e3c34281693da0a356173
SHA512851efbe8d180a657db93e2c70214cabb780bbd34888d857b76e3d7c881d215d5f63aace35cefbcbbf6c8e1b9cbc1e1b62a6583dd45cf15d9ec9b5053fef1d8c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530982a7d426b09e8dad85a66b3965811
SHA1bf497f808838abed026ac519c3f17837653793c0
SHA256634166a8ed30167d736a9a3e0a07a32624dfc9d658be92538f7a8901aa5079a1
SHA512b5e4580db42c06e46d684cc70a15afbe32a8fcba4681ef137a41affe9757afbba79cf0aca2cd480d57b371dc9421daa79b2706c57d75996d91a0b030b85cd926
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bff9ec483f2ed186390d4e42979ce24b
SHA1cf1b498aa6d296089d9d3d70b77458ec0a44bc4c
SHA256d2ce00a4fe5f0a7110b89fa5af157872d3522a7e2d1c5c5d6a500b1cc6c675fe
SHA512ddae3845d3b1a6a42e2f7e781a25f2d3206e512fdf1c2306df0175d9dc2b102fc9d3ac8e0a5322da459eaa2b77c95ed7711714d5f3dee170cee4bd618f898a22
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51404175282cfd3438287bd6d9c3a8e48
SHA1118de8e39b5ace83b1e4cb64611224f0f903f63e
SHA256e368c2f04b7ee8c4d839bbd55489e061cd333d182928a0d9468aa5eba762596f
SHA51252e2cd24baeaf5f5b02d727163e3cf4d36dee0fe8059065ebeaf64d041d0f51cb3c7fe6e5300afa437ad43aeaf693bcf72af7b13e7740d602a28cb6b83324911
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52130bebf6eefc85394d17be880ec718a
SHA12d8cc33b067c52d5c901c608c84a12d5053db870
SHA2564092526ddaf1dab85b6440c09dc6fa8ec9b2ba36f320b648b1d7cf11467b60d5
SHA51290139fc53c31c9445eb1323299235eea37af2da2c3690c048c09222ebd41f16be2310cf3a152707933873333f3b0f952dc0b2d5f6c126cd887838d56e8fa13c0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5449455871ea04b9318c7ca16261dbdc0
SHA17ef8ef85b47e5ae1b2332f61b635b07a562e97bb
SHA256156b9b156b2ecccc4770b19ed810fa4751338500d0e8dd88fdda69157ca89a1c
SHA51263b0ce44f5693e67a50165ec5ff108f5a8785facac9ba09c5f02825f86520d39ee3a971ad4d086d253eb41f3eced1586d153dabe4d593aa43b0ae38551f90123
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b8be120e2f3f1a26a7d05348de815b0
SHA1a29f1235f79d797caef070aebc6b973e70dee93e
SHA256c3554066c670b8741eb16ec906dfa12cad90645150cb0efb1815d6d09e30e0c7
SHA51225e70850458d5a3583886cb95a94d02fc0692e6e83a2e6633095a34c9d2acbff3eaaca8bf87b8bddea5a22affb10a8480661bb0048a594620fb7acd5beae4b48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dc64d0329a62a5b4ab739dc8a556c068
SHA18a660f40d36f6429634c2eb4a40b5201107bcd3b
SHA256de2813ecfa928a7bd71598526f29d3567be4babfb8bcdfce117bb8a5704d3f08
SHA5122894f8734c3a9ac7167604a17398f38fc48fa3d0f3886ef1516437edc61173f1a2d74f84a6d093984f18d57bfebb646eb5f81ae5a04b8602ca7dce9efdc07f0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7b22aeeda27ee13aa9863c1a257893c
SHA1872afcb1be6b1836fecedca24cfe8d16451a87ee
SHA2561fc3c50ce3a807c6e25cf221e07efbd535b59749880afca353d3cd461fb37993
SHA5123a6709bd81c5f40e4a0c5b5f5144e6f14d30a99c03d4c90f47c3f94aa96678a959ab819c870908a1bdcc770aec700c8dc23d5c118dea5e90bc8a1419558357b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a3ddad5d124599e177eb56cbd05fc583
SHA1f3bda4c331d717b2b1fcc213fc61a0d4dd873c26
SHA2569b5ad3233915604c5dcc8d1f34d47f1820556dcd1705c291908405a7d61b8404
SHA512c1ad04c132fdd2802583e9d73ce87bb05d8e2f63e5ef0f957212080680ea3034ac80c63ef3e77ba446a0325ecde2f0412bdba7a49b5d6215feb70f5e1578a448
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58011ca4b4381108399f6e33dc2ade677
SHA13ff8446f462ddb002a7591e15aa5e6bdf54401d4
SHA256042e33a144e3b7fd3e0ddbd51d3dcabe67e27b66d477b39c718576b57717f2a8
SHA51232c8a05afee7c2d16ff9d4396a77872cec6044e33215c79d631f2e9212d6263616aba5f989f4417d88e7710c12a8c575f5e3847cb25d15486ac3f14e5286e0f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557e8b9e2c9035831341c08240e0b5ed1
SHA1cd47bfec7e8883ed458a109a46b849e39cdedea0
SHA256cc12377eded539b3d0681f89370e62390e709ec1f78684ae0cd6b93e4462440f
SHA512cf6eb19219f2eb014840f93116821cc095e38fac8cab9faf232b2df2b765a35529f69a6fba1666b5c708b9d062a29c61d22a1a98d5a749ff6f13ca07b3c45375
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a9407ee90ac9e37ed0155130428c6f3
SHA121cc1bd330b1b5e3bd8d51cd639d5e6ac950f59c
SHA256fb4144ed4eebaf49a7acf05eca7aebfc4210bb82be4386ffa7d8bd5dcaa43849
SHA512f97583ad23e1065165e9f3f94d0380be534b4ee70453ca3fc79656e0d3aa22a09b820d3ee2da5b240fd257df9d6269954a1cfbe4d1c86494b041ac56d6595d6a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5920450b0c0507c791b0775a75d38f0bf
SHA164463ba19fa277a688a049d8a9b3f3e47e5013be
SHA25644ceff37c496abc8c36ac70d6c6a951547f992a54005dccd2ed8913ea0b9f13b
SHA51234827ca84a1a6f0ef46d7387f88f66a4e4063a30bfe0fd63377b16f1304be63814aadac665b560e56073fe13916a62720c61e78b27a9c0bc914f16855b7fe71d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a007a002bd69c33ab23973e4cc5641db
SHA15119508f0d685f3f524c92d5840c2404b6238c7c
SHA256170b355c773f5f11801e0e158a8b1c32796a2936532a68eff3a9d2718aaf09be
SHA51285dfa797dc0d7b9fc4588879e11d1345e1400347e6997f6fd1c0fbc8602bce75167b70e89739da367260cb893e5f19ddb5b36cc77b59b5c3ca1611a807b3d9ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c49495d4b9bcf6507272f6c0565b238
SHA12fba09b9f3f47a59b8b9e1abf0d5ddcc2dd5c8f3
SHA256fd46d569bc1a5c0a63cf010ed0f4d62d09645d69c1ec6b4be996d1be7d5251e1
SHA512ec2cb113bc883a3aaa730caf098bab40d9177d82fb9cef005ad8129ba6f1cff613f7e77911b29578728da3777486a2f985a61069ce3a59b4a75b37939680f80e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e4e5f271eccc3d55655e3f3ed1fbf281
SHA1c313555c1ad9322bfb5cc073105608a191860f91
SHA256bef425c29111eb3888734b83a2e7ae660afa2b697a0ae06a72a9ee00c876e9ed
SHA51246efedbdb76eff7b29d6d650c53e79185ff278bf4d229589d252b60a320f8d9d61a4aeb8743873b8522068ba207233242c9160e5658f38dada1f8c4db67a2167
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b