Analysis
-
max time kernel
133s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 06:18
Static task
static1
Behavioral task
behavioral1
Sample
a42adb41943427f0524abc8b4f1d78de_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a42adb41943427f0524abc8b4f1d78de_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a42adb41943427f0524abc8b4f1d78de_JaffaCakes118.html
-
Size
4KB
-
MD5
a42adb41943427f0524abc8b4f1d78de
-
SHA1
9e686484194528ba277415f1fe20262255509975
-
SHA256
99137f62fb7b22d713135791a7e70052f4c6b0f82f8d19fe828284882f6a18ca
-
SHA512
9a7f704bfb888cd2e982ccbcd45cb55b2ce25869f9b49958085ba906d183ae847ae274a8114742ce5f6e0f42927d87a15e7c355c4fcd6547aec1884893d9ba6e
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o+6wud:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDa
Malware Config
Signatures
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a0390500000000020000000000106600000001000020000000894ef67d17bb3d9adbd56693b5c1cd8110c7bb428bf865bf4b4f7ebe543e0860000000000e8000000002000020000000fdc36ca1a83aae436f22961f498b69faaabe12b45792f21ff6cd987476378b8f200000006ad1e0cf4175a36ba9be470f7bb722ffd0bd11d80ac05727ef908fd4ca0f66f0400000009383ccc1096710c6fc9350410e400964dc7d306dc88c7295e4de615d32989423bb39e8eeec63621c032d69dd3b60d9174cf953457d9c9c33684f0a3aaf6adbcd iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C8246381-294C-11EF-AB3F-D2DB9F9EC2A6} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424421390" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f004b79c59bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1172 iexplore.exe 1172 iexplore.exe 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE 1280 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1172 wrote to memory of 1280 1172 iexplore.exe 28 PID 1172 wrote to memory of 1280 1172 iexplore.exe 28 PID 1172 wrote to memory of 1280 1172 iexplore.exe 28 PID 1172 wrote to memory of 1280 1172 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a42adb41943427f0524abc8b4f1d78de_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528daeae7da1c0e2bb8a36bf6cbf9795f
SHA101dbfa4c7a83d348a098339ec4b7ef5afb837097
SHA256e8b0c39e171861b0a32b27459eb5919d104fb91946ddeff7be8240ca07d6c29d
SHA512ba6129c538466bc353fcd1f49f1101f6b0797011aba17e2dcb36a6d7ac29d99ba5bd19c9d72352e73c9281006e76a9901e3f7d840387baef301db1e891671233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51b45b148de1fe9d41cb08b9bdb0fdd92
SHA18155ccdf00ff331fa49391e5d4588c3ce8b70645
SHA256d43f4fcdf5f40a377c6296042e065f0621cdb91d9e2e808431b8139dfdb66a67
SHA51254b5ed8d930709c0af8667aa50f9abdfa96e3f2ee53c5fa1bf48fbb6937a19e05c67069e72343f1c8ca0144e61caadd052223b6d2da01844f15c7a8392febf4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5581a8104044f6f70417e21cff8cd7a15
SHA180f7cf338e3b6366e6da1695e3ec00c6120249ad
SHA2562a95452fddf72cc4175151b0b0e7de1389a76c02bb0fcabf03c7ff310f7d42b5
SHA51278fca1c7fbc72a86501fe55faa6464dcf56dbee1b8a482d3c47de3e2b8aedbb61f55d21f1bffd41a2b67198da968edd0e83cb1ad53a5714372085d5148c32549
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b8ad75e3d6a3a467018763d53e3ff184
SHA146956e52010a1befaa2e3714e569d09c45b3544c
SHA256088a62a46113ce18a9ea7f7e2678b75b6159b779c289937439e7dbe2dc52eda6
SHA512584c35ffa1aa89349f192dd4acfc8e2b4e11c16b79faf72d52935bc1311d8ef98bb669e069010ccc45c7c6abdd037f98eab50e67a7a459947c15499413230b73
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56fdb6199261a7ef99fc8f44cf9a73f72
SHA17ae03e041d4520f4806d9d5e8927dbb2713ea286
SHA256b38119bf9fb9ae07eb1a2f53bb7bc62092b12d1f64d0b3105257b7dcffac5f8e
SHA5126de445e6c12505d06f95ae0944ebc9862363f560e8a58afae90dd5e017cb1c94d1c3b92ce0ad41be95ff78cb22cb3ab521bd2b8432ecc06ce89151cf6c583ead
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58b4821888f7fb946a1a0825a053872cf
SHA130599e216e0b98c01f1fc3cd9bf0df500894c9ff
SHA256fefb13c13bdc73f68a81d2af59395bdacd10df9e77bfccc6cf2bf4b3ccd9b09c
SHA512ce2da246eccd2c1c07236e914004111fd6c85f4a58db3472c3b039e00140cfe34290ddfb85b8ae780b61c378888dff30291a255d7447f38e50fe3f080de4a7bb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c805243aa93c061cdb292532eabcb9cb
SHA11d075a93b9443c6f51132e93ee4de9ab828fc705
SHA2565fd8a550ecb498b147506d18711f6ccdb10fdc14e1730d991fe0040817081afa
SHA512d722c7ce4996f5a0c74b9c2f35a4735086a67690c54c08083ae221f305b8ca13cc5fd83f23f67f543751b4fa6a9befccc414282112da425183eacd80d3b8e3c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD593cb6794f0949257030d4dc3f1e6887e
SHA1a044aab76821302770cfface5578e48204fd2510
SHA25621c0c6da72a2d050bcc31a5d30a783cf9cfacd99298e843cd4e95d3bba4b0bbe
SHA512f45971baba6dd89c1b4eea09c2c2d7d465c26c97f8cfcb7b6f0e35d17a9ab0e1700d48f9069f9de276a36a1df38ab9f93acda31564441a3b3fb06384917e367e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5569238da870d69ff85b97b930f7e976e
SHA1127baccd86ee227b90f3a7a85a7349e6f44ab27a
SHA25684e9f6825832ba5867d3adc01288530138af6627bbbb6668a6901042a043b99b
SHA512ab8107a2275cd7743535a4d2498845e8916ec11509e62e44cdef50b1a1148530b292b0e2011cc6713752ca3d5d5fdba0ae13364f435bdcede7a16d93f69fcd6e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fb01faaaa98648ba3ebdd60b43fc6bd
SHA101190db0d9a3f32828013311a1c0e4b4e87203fb
SHA256027b80e44f41afba5c5eed7da19b40050398fcd3dd6807b987cb22a92a0ec6de
SHA51261bece69da939e52e0a8792fb69d3c48d4f3f2dfe36d228ebd0a04f5934897ebfa6fa155fdff8f4b561f5dad72305888f99a889412f16a2612f9bf8d15b6726b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD581b4e1120aa22639a4c93df732b47520
SHA12ecaabb20f5317dfc9efa1488d477844caf8b16e
SHA2562b62c982fcc46f995af123ebcb42343c3f04af88ead3d808aeb1d8f1c43701b9
SHA51212f29cd4156c88889b1599dbcad6d9bd67345ffc875b12ba4f3b103556f44cece85fe2e81d918d8bc3965e410d7fd3244ce3780e039d2b2043bf56fce1f76ed7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5994f8b90eca1f86da8bd6dd164c8bee9
SHA1e02f2f0a8bdc2e76326db3cff6f2733175639c04
SHA256c68deb7d3680c33fdab95ecd18786000792f744d50e1b2bf5cf7b5e7fad8c998
SHA512be637ddff56e9e3efb39f32ccc49c9e36071ab7ef1df5dcf99c52d7709710d611c47c6e2e194516b71400625c51425c5dd689ff6b9581d1daea0b5eb8923b768
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bf30ac643a45fd04efbaf91ae4ec644
SHA125f00277dea0b129f22489cce9e004ca756fb9c1
SHA256604d85e9b70a7bf849ca191ab4230c4f0bddd2d0d5af709cd397a310acd786d7
SHA512486e517e6ffaa1b97e9c2cb8dee21e0ebbfa475870436633f39eb0e3175abc76ac7b0a4e8e56309e234c1af5531a39cfceafe937a60c0f7a2f02dd3d26ac0b68
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5683739e3c92f147fa9c2710579914e2d
SHA184ce397a7323790460b91769cf54f3ca19d856d6
SHA2564f09648af2634b8f42e17dab91e56ca448686d264cb5df1cec51b8c4140064a1
SHA512fd15b478eaf0ad26eb72c75ac13ae9535835f7e2fd1ccb4cbbadd3c4063e31477456267f9188bcd0494c195bfa6d8c5fc6f5aec3270703988ec8e32be474bdae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e552646f202463de8ff5746bad57760
SHA18bc889d97701592c990ecad15124e4d1221e78bb
SHA2569e52641be894d14d7f269ba1eb7446d83b544bf84f41d7aa0c81bdec9a114a3e
SHA512d1f1ca343ccb7a5a9dafa39a9d301cfb05bc34528e5ec804a8ef3b988d850a2b70d7c7266eb4f9a637ff5de7ee9d6f8b068aa4d573b7fca9c2b3394a47ccf9b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f6407b3bc23344a24f0057b993903c3
SHA1c888edd3e2cf6e1e0ec2682af95e2d5900178131
SHA256607b5134f99cef9e42280c1d29298476e52a50b12a2b4c8a2a5f06066d028ad7
SHA512942ec82c895670809f7126b18eead002e667c22c6a4654630de521113fbd1e60b844912777cbac05c51f492be1fcec77f8eaa000c3ca23881ba19cfa229a2547
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535309a1629667896240ba8c4432070df
SHA15926ab316b19af5e671c86927b809dfd6e082a6a
SHA2560b06a66091d142ab7f97548a717253fa42cd205581a3dfe776936a861c17c107
SHA51235d4fba1aecba0c9fd70183d091355297f831c31c356fa7483cda55b47c2b999a864d7ebbdd4e64592d4c5eeb489c6a7fcba05724abbaa47e9eb56dac923c316
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5158b0824b68005e93d152043645c6157
SHA1cc15938dfb39d2fb9337601d896cb6a31f4ad33c
SHA2566fafaaf7e958538ae27b422b74e0a87c2307e0a07ffce0851d85316e0584995f
SHA512118b346b4fe39f11ebded17b6e34013a47a76daf17295de32338428e42b08c5e4f2b8702fb73cfb1e6a58667a98d3f9ed19fbbe522690e71f78060159aa07966
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5006c4c7d72e6c0725108208ea35b45f6
SHA1373ff6568333a99d0d24295eb38ab93594677e90
SHA25635db7b1ffd6fbdf5109dcd6b3a6236eba1f763f4e9dd8ce356dbec09de05702f
SHA5123dc215186894bf92242e58ea0e31f251a56f629e9ca674734be0bb249e91d7008e406ef26b29b9d906bd7653dbb51093789673de7b0453a6e8657b7f21019523
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b