Analysis
-
max time kernel
120s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
a42b3f855e89b3a5b3f5adae1d6be558_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a42b3f855e89b3a5b3f5adae1d6be558_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a42b3f855e89b3a5b3f5adae1d6be558_JaffaCakes118.html
-
Size
70KB
-
MD5
a42b3f855e89b3a5b3f5adae1d6be558
-
SHA1
77a0180d81c59d239d5c8d0a6748f1cc205bb1ca
-
SHA256
1c75628eece4f9931a0ddbf3c12156bf62b65b2b8a15cc64f02e5e80ec5d2af4
-
SHA512
0a63715757b171600fadc3835db415e20e18ac061eb05a27baaf2649a971814bf4a413cc3757e779c4de0cc9cf72dd7abf8e0db3ef9923e46a6ee76eb9c468b7
-
SSDEEP
768:Jiz4gcMiR3sI2PDDnX0g6sc6ibI3NBoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQV:JOWTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D5DB11E1-294C-11EF-A72C-767D26DA5D32} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 303a89aa59bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000023f2cdc82534fd692514213d6f7e41398498e27c50fff6edcc1dfbda6daafc11000000000e8000000002000020000000a271fcbd1eeeb1efacba48c8640fcc39ea7b44f4e142a4f8f62af71da508e14420000000d7f1b9197ea5166df05e0bc2d60e0691bfa8f62fe484ebddc8bd831075d18f2b4000000020106547daf94ffe8afd6b76de502ad5362871f7fe6e5e790e61479af3be9f87872f7c258fa1bc16d5a5713f9b434200743ac950c0333dbdc21fea5fbfc4e001 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424421413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1844 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1844 iexplore.exe 1844 iexplore.exe 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE 1692 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1844 wrote to memory of 1692 1844 iexplore.exe 28 PID 1844 wrote to memory of 1692 1844 iexplore.exe 28 PID 1844 wrote to memory of 1692 1844 iexplore.exe 28 PID 1844 wrote to memory of 1692 1844 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a42b3f855e89b3a5b3f5adae1d6be558_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1844 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5721f4d771e751e564adb91b3e7e4f6f4
SHA16d51421c01a895cbd94dff00a632ea67e102b4c9
SHA256fceaffce4c02f27d7461a82a19736b16c1fb7519a12a63c14114986af00da16e
SHA5122a3af8f65a08590709774cd61882c30397a07304b13917cdbacd44916510cbe718dc7c1e172fd02617de9df225c7804a402049678b4839ddc695320c5a65835f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c00f84b893dc6d67312b73298c421be7
SHA1db4f39c23ec25c213b472daf11315d5148ca4e22
SHA2567bfbbd9539ee8cd2be4e8c2e352b52a1102fd50c1f0a5640334ddbd55e26db29
SHA512b55be69d922cccc8eacf172b10d83070fc4b5689fbced5ea1f81fc54b84d2fe5dd071dfcfb2042f7cfeadfa669e1c7ce57c2a04b09dcfbf126733b7cf6f03aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aea6d4987c883abd82b16069b9da15f0
SHA10375bbde27e809550278a739bff1db9807fe626c
SHA256590a63cc03fef7da52ccf0467b6ada3d0fdb1151ab2718cd1dfd23171d6dd935
SHA5129771348c97f2b34bc83fc86d27e18d4d3e04e8bfe282ee863240b07c081b9641abd66f539f60c36d94b2c7182eb7499720b3c32bd6b2c6ab12ef014e9216ae7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575afd7a9fa56bff087e385aac816a453
SHA19e3efbf3a184e7779404d9acc572a1252efef6b2
SHA256e95d027a54d6279d603e6c0d3da2692847c393e94223096d14f5d0c974ef71ed
SHA512d59e975e12a3d8d177b7fb48280626acf09f0a53e76789fd7dd83b8a6301828706093a8688d3592d18dc17d7e86b41f3214ff639eaf4a9821a3639ee5c14e774
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fb9f5595eaea0e89eafb9a531d42706a
SHA1c0dbaad5de98315bb21bcb666d2b982f107779d9
SHA256a5ebfb8f4ec015800ed3f83fa9a095aa8a47fd05a3b420fd8ed2b5a46804d3fa
SHA51213ebf8c759ed1d5e197ce905ec71339345288de00c8fdeeeb365f35861cff8971d10d7c58903d4101c715e61c54b50a41dad44cbe38d9a1b17de38fae90d4f95
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD547e92f9be6d198032a47914e535cb7b1
SHA17837f43b46bd7d6b3a2053ce05a35f0746f5408d
SHA256fdbb167cc2a0b2b0adb4dacbe301582aa1d79f8e236e54b360cde84c96e76382
SHA5124e33371a3eb1c863e992eedca49936249738883b8a749005c49ce888dd7c9bd9232165b5d090ea71d5ce44caf7f6dcf04b08fe89c5db8d834a9647dc10aaf1c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b589d33c0badf7f78ac8566cb1322e54
SHA11178195fd7927efdc5f5d664102fff1c86883210
SHA25690aa241bceb24935f91619b731e54dff2f78b466b4f6080f9684de9f8b11d7ce
SHA512beef26bb5513be3b77ca79bac09ff8a6702150d4a0f03c66ce1cee84076f2ade4e5f657e26b9c56dee4f43e1353e24de213ea1e841b3a4cd03321d5daf04a624
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e23ed615795b731ca76a0726d262875a
SHA1333a673ff0e0166178bf32be913d31c89aca4c3e
SHA2567b46d9e7efe8542ca33090853270f466971bed21bb00e446ed426a678f80212d
SHA51295c76d5703889872ac1655d556dc0e49d2561b4dea972169ef92e20fc1e40dd8a9d060f865b6a212b4b76fb1d36fc320fbb0a8f7714d804619578fc0ddf9c62f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56e1adc81b8f7c58048e845dc339cfc67
SHA1ab90457080b36e386a10b80203d7eabb96c8ed7a
SHA256408f682aa96b8febd88d3e95e1e3e4e7ea1fd27d097d72177d766cccbeb09c36
SHA5123bdd59466c6fcda6b344099be164d1b99fa4e2259ed4c5d436039d312a9f5a277d22727648963fa43afd438b9e77ea609a95cbd124bb3deb68306eb50dd34f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c498b31d2bfe089fc6d3540b057c89e
SHA12725be5d31c4dad6ff15ffac6a948a041e8a63d7
SHA256fee0ad0ba596dc3ee474b7ffeb43baf98fa92f281303feb960730a7990c1379d
SHA512d05bce90dfe27303fea3b602bf15b5de4f70e45a4caccde8d3d3ecbfbc2268c7c15e037f2b63bd579095e41d8d051a3bd5d63909faa5a3307c7c3700e06c4512
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD503240c5cbfffdb5060579d83dc630605
SHA13426e86ae90f418adf65f5d54268dc014659d59f
SHA2566531a67ce79e3e84b6334473d84d0029127a10d86fe457c183823162f45ef7bc
SHA512eae8b7bbdec7a3b17b285771a4a1ea36a37768344b5328c34722ffbbccab39abd876af2dee9b11de7521fcfaacc13d1b190c3621a3d34d320bd585eb30da0bb6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b16b353eb71ef28242a79eec2c849206
SHA1792667763c4723d40e6cb96846a25289a48d2a62
SHA256d166b6b68a6b31281e2506be746001a2c9849774970764e3fce45e83ad698350
SHA512b6706fe23c1516730e3cbb2bfdad3a7e9ed22c727dd9791a2732179e14c4a43d7d8e8d7488cc7e4150d68e6ce97233934dba9160ebfbc66f61e2c455746570f2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b6ecae9e73d17a43e1039b3ee767452
SHA161468b0d779674d8ef7427e22a20969143ade357
SHA256cc527e18cb4bd439b084275777b317b8af64aa27af951fdbfac2d5287a902e9a
SHA5121bef709bdfe45df3cce3c34307b174c49d0295a9e51036892f8b856776c3fcaee682ee1ba1b19f4c287c0f0cd49456192ce14a920c8b7bde463b640d29b5d459
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cfe4fe1d86996d6918046ac9cde1b48
SHA1eeb344c68d1328a99ef36d5d9d88504121ed7d66
SHA2567f7501124e816bcb594999a6c11774c97c149f1d5ebb95e52e13c0fd99382b51
SHA512f0bb5c7f3f42efaed3d18ebb01795ef0397f2515aff1a83e3bd5b8632f43674f1cea25ce0aa7bf55c591b693f3abe5de0aef6967dfaba9bebb1087b3a0b7ea58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD550f9ca5f3a5ee22de3e09337b768ce31
SHA1d4b2dcbf3c04254a34be9d0b95ecbeda4d88933d
SHA256189fc14e5c3e23a7fdd9ede9ce2ee68b4f09094475e7c30dc9f57ade3055302e
SHA5120d02ac9110caec3c102c1805d27d60976749a4f127ab7800d1417667c3e77ae9c1d19c0554f83bfa7d5c6c61e8ac1937c72134e022d98632e05e9f950f4b1769
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57eacb8bab77f2cf8ff3cd89e3eefabe4
SHA1c2382ef20a742e483cb0c9e17e5e711ec5d82c46
SHA256fc9ee9e7ff8e70e1e0b46df68ddeb968f0baeb3567d0c7abaadd94510f273cee
SHA512de1efdbc377256a58fc880398ebfd88fab985f6d0b0ff7b27b5b7fa89d3806617468c1bc113999fd44bc4dc7ba97f6d7f0b908850459fa5ea0addf3216b50e59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD598687beccb9ed631586f0acb748b3e98
SHA1d382efd59264805af53b2590b6c02970de14cfde
SHA256c4e244818ed2ea2d4cb70c305b4886a52243bd14abfca1e50660772ba07c69ca
SHA512dbbbaf08d8a0ec240b0828ae62b2a30c197807673df344258f4021798c1c82f0fba61ffb61c79520212bdcea2ea5b5e8dace777520f24a179d48d41c471789db
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50db64b47bc66e8ab992395d4049b9f12
SHA1e3ccb0b244845be5dd222bcf8258a95205389ce7
SHA2562e54e26b1bb2758c48b6e4c72686eafee39ade35e8ac148459719f69a73600a3
SHA512d310eeabe9361d1bf8030b1cb5241c4c1fb11a6c5875bbc9b67e11aa8a6332851e2b9765bbcac94d545531b54dbc1e806dd5600144f4b0051123f6b92f076840
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4484516a3f945fb3c88549c92321e77
SHA163c2ea8a348f5b68943e8f85b809c08ba4541955
SHA2567dcf67d65ec12c437858dc1c218d5922f79bd824c1302cc8917b8d1afcd43f62
SHA512c11462abc5253d83ff7a85ea4f5beca5bc99f8a064f1875bb64cabdeb62dd48331b6d40d63188b4db8d75102481a542b392438ed20d6ad1ed4647a2c0b6028c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c792c20e0fc65192abe42d282188298
SHA1ad15d6687d864fbd2a9bdad06bfe72b028458a5a
SHA256c4c8af6f3aa8d2b7d852d5c328f1d2781fa6380af598c6936614b3f38218b9cf
SHA512914e55a4f4f75635920a27d7a33ae56798985531e9165bfd3305733eb269f5dc74be6979342cd193f548826d38d857af9c992ca07ec8874ce063a6923ee66e69
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b