Analysis
-
max time kernel
133s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
a4092d4a0d37adb59d1bae64b93e8903_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a4092d4a0d37adb59d1bae64b93e8903_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a4092d4a0d37adb59d1bae64b93e8903_JaffaCakes118.html
-
Size
6KB
-
MD5
a4092d4a0d37adb59d1bae64b93e8903
-
SHA1
eaf3aaa5e7da341f43692513049c9da0989d9aa8
-
SHA256
f1394c9c5b8be536755896537bca1bd04b3b733c9e37bd2e7e13205165272597
-
SHA512
ecdb836a1d41ae68623ce286bfa31a281370af61f4ce48321e1c308e0afb4e164b1b098b46d4bc26a63e231f986f4153bd74fcf94b247603477f38a9647a1f60
-
SSDEEP
96:9hM3sHf05WVtlknrXnLXkJBxJdUOGCWhWJlsyH:9hM32tVQXTSpUOGCWo3
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10b4547154bdda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a039050000000002000000000010660000000100002000000065de80e3770f4e17015f2ea8b88680129d403db130e69eb9c5386126361e1448000000000e800000000200002000000050637135ea071f828660ffb476dc4aa259d5b1056326de5e99e6f2d3cc99181990000000738f593150cf0784469c15eb7facf35fb409e0778b25b71fc80e581acebba8be8aa18231819fefffc783353e0be115da981adff7a7968ec96707bcc190701c354b9210daf19e57903c62710fd26e96f6be393ccf7d5f27c42232ad56ba757e9ae788a438c1e93e85eecfab7fd006acdb15db7ddbed518026fb2e98bebe06d5a26048146d3c186cc5a4b7aadbbf45a8f640000000a65c719cadeb1e20aa44aeb675a0447f961ef85ba572953da628acd4119c88d0b5ff2305f6e6ad6eda14696e690baf8631f4e477420767d542b534cfd3b1258e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424419170" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9CE51391-2947-11EF-BF32-6ACBDECABE1A} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1340930862-1405011213-2821322012-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006fb3d087c4ee9c4bb22550fd83a03905000000000200000000001066000000010000200000004228f1689ba69089e690d47d3245e217133b7c2fad1fa933f8e31ac6af801ffc000000000e80000000020000200000005d82388571a70aacfc2c4b6116423f1bd1dd4a6462815088a94783936ff53f2020000000431c0db4933f520b625d0f5d427ce20c9bd01cbc1cfd2db2f705e24139584694400000006a26f09b342f3637cc83f9e2c7f8e22ee6d913f23ece1455bb1df674f3fe887a7050317a1cca38a79a80c6df67be4def9059e57f89f59eff69acefb33896e95e iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2440 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2440 iexplore.exe 2440 iexplore.exe 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE 2128 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2128 2440 iexplore.exe 28 PID 2440 wrote to memory of 2128 2440 iexplore.exe 28 PID 2440 wrote to memory of 2128 2440 iexplore.exe 28 PID 2440 wrote to memory of 2128 2440 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a4092d4a0d37adb59d1bae64b93e8903_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2440 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5deda23d5b9a2d0ebe7008091ece406a1
SHA1ddcfde8fd52210f8ce87b9f54746547cb39bcc9c
SHA256f72c051f1b4e095f259fc1a186865619b94595282ec2e1df164b8f0207e6b3ca
SHA5124dcd9f8c8012088fdf0e36f1c7cf8ae3fe9294d1c7bdb41b9dabde7a40d8dbe7e10458bbb3ff1060ac72df6c1012c96b945d01e05f5b723f78460a54f418ed8c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD552edda75d79cda2b80a432cbea30b775
SHA1f2eebd76f87fe0443ca47f9fbfe9d4c7d86a7927
SHA256f3fca458ccb3d42968eab2b0be7d2074cf1b03685616857e9a6a68697e48b44f
SHA512503a7a1e9eb98865f8e36160381e67988eb171cf43177a033ce74a072eba4573f1dce4f898792174832780969a36c3943bb33f0d6a8a7acaaba009bc26e5468b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b74f31d3f330d986ab835c4f7669c8cd
SHA18247cc0059827900ccb6f3fe321ab27918920854
SHA256a658636791a3069c9892628c543d5c24a0d98f4586376140a4390047e13f19e7
SHA512661f1a0792d02929a6ae5771a4875b39aa81c3a41e5f515eb322399483dbdb5e491ffc7fa22f9e94d9001f3e258bf3803357d3f808795e3d984b2f331bf96152
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537c5326c04dd5495d04f28bfcb39e3d0
SHA129cb587ddea3f8c61ff130800813ae93993b8449
SHA25697f72c5d70b65d0d91efc3affcacb6f4a77902e01f602ec71d1f5a22b049bff3
SHA512046989d8ed0fd891c6f2af672bc46b7234d391fcaba1eba4731bec314688b1516bc4e0d784548d058ff4d22b09d64801f8422eca33641e27c65ab34590bffbc3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffd73744f9430de7052ef8521cb57934
SHA1b5f0e76e5363ea296381e63e464bfbc9999a8a5a
SHA256d14e0d2e39122f484799f27ecca51e71a3a24beeac0beff4015077100c00c34a
SHA512ad2d777a65590a989b6f1046c9fd091cb8d9b18774ee520b4ae209f1eb4e9f897af51e1e6a71bfa7617603c1c6a7c1de33bf95e8b3333ab0a45b2b1a3dd58f7b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56b56b7c49e6bd029b1518e58c95b7e2f
SHA1494c4887942b6c2600542b23169087bb2fccb2d0
SHA25631c84579780ec61e51a036ac42f4077ceea984b89298d426dd129c75f9cc07b5
SHA51201c887531fd6b9b94c82144a29421180459279a2a640c0f7389a7afe2178bbcd285764094790ad8925cf28998956ce952b1a07267547245d5f5872079cb7cabe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572ac32f7a6987de88c094aca72a0cc1d
SHA1d279ad2a5c57a58f93cab72f4d0120fa3b94d253
SHA256f392669c59214ffd16dcada65e1a38168461bd269db8717eda10ef3a58b8a436
SHA512ddb37ee9ab86a7f92ff87a2ba3780d7b5110bb9f92f0a12b0257c1d11781f49bc39b079be1e414b4bdadecdaec701489340602dd03a78f9846e76b15a19349f4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7b3e3520a80344a373d4b7bbd254ea2
SHA1df68ed4b3fdc98a46260883a1cf62fd1869678a5
SHA2564b35289c48a309f101d3165abc7b651be6bcfd192bf5f07b4a35ca58890c8f21
SHA5129c9c29afaf7b9e4e17a1302a2ed877331c5d02e06e6abd8822db973824e1291438ef3d9b4a8394b519844c61725129b46b79b9278632890c583ff6b8e4200723
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58be7405e22034b4a377e1db7f2860c93
SHA1a7181f27e7b5ba6288a459bf105afad521e7901f
SHA2569bb55b096d52bf8124637dbf7373ee0059a2b5d76b533ccb983eb4eceebabb8c
SHA512479336ba887b7893e066fbf1f91ee8fa76fd4fe9261939a75ff50469a0b9b4ffa0ad3cf5bfb31efe6a892e45033493960d11661766f6e8cae9abebbbd173497c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5669d5a9a6e173c50ffeb493552b60b8a
SHA10039a8ee8189350c236f1a0cbe9a3eb974bb5b48
SHA256891374f7ff49fe4a69280d4244222f73960fac816b089f7b57df032fcef65be9
SHA5128dffe6ec953535b5810cc8ebf68e7723d2e90fb39411ceb64337965067b46e68debb898bfaebc1b5adf8277d8cbeedf7aeeb5200906661604656227c95f521a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dd79d406bc8b83ceeabcb43c5955f089
SHA140666f950bf9660f934029581dca0dd5ba306b02
SHA256a39eaf6da694c52344cb24c9a94c192b7d7823921c221cbc8b30a94bab020073
SHA512138cfb01ef5b7e6e422b77e4e2c6428c15b07caac63a487bedf84091d66a3f0aff9c50c13ee114bbf4886e3394c746ed947d229f6b8754fa07e57f7c757ac337
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54570749ec5b76df2763e39f26670cb2b
SHA1273c1e02ac05dab267aa5fe374af582df786f94f
SHA2561e09318706ce79b833d1b608388749fdee477514519ebbe86cef734bb94c89b1
SHA512cad4e4397c1ae7db83aa29ba5e3af23d98108a597a7ad8ed234821cf4b900de7c825cf8d92dadc987e13a32ccc08dc4a9f4af17beba07317d9422d1336857b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5acec0bc81dcac2654767a09056d8706d
SHA1fcc11617b327d86738ebc4f5246e49a38be48d7a
SHA256ef341735a840011114e683eb99ab661889c35dffce09b0222a67b98598f4e38a
SHA512d7e4e7d1327d8f79fe4a3d60b96b822977635a351a554716e23adbcc220be8b018f6aa133b4fc03a98dabf30a4f25fab5d0faaad55f8dbd0819e999df3a29ea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14341e17dfd3389d2e0e0eba7ff0835
SHA1fa1f6d8c2867312e0bfb8439900c76b74c6ec973
SHA256a89be22cc2b9a7c4605786c3536ff67cffca1bf4fc6a93e6b0d520450e686f15
SHA512cd91f93f87e34fee44c293e901c656d0e8d2fe0ae2df232b2095dce0af159154fd8f4f33fd8e088246974288788548c199bfc64cd54c3203e558510c3c5f86a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b0040fe36a12446e6f0864508e7f61a1
SHA1fe353af9a9176a74340ca23927a5cd783bad05f4
SHA256621b445a0c3bdf5c2d4122dcb709f38cda7dac417dddf64238f123c40a6a807d
SHA512d280fc3c3e1f459e8c7a1d001d5861804860aebed7703f6163f9094c1f1a9171031e206e282babff4015b266020133cf68da8f324b1df12b13a44478265896dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52da4027f215808e9dfc8f849cf561539
SHA19998e7dc3a43f3317e6f85d33246e616120ccd2d
SHA2562922560f118b7c83c437a1487b9e2cb405ce8116368e62c74acf028879e5a0c1
SHA5123313c7e94f2bd5ed3466a51f03567056f55b4ba7cd3147975836e99debf6f5fa73afa526c354a0f5c15244870e4e7ea74c46619f0092abc55b6cebf174aacae0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566d814f5ca8614f5b2c63c16c69a446f
SHA1abc3a5f6339068b69c9e1dcb2ca662fcc7bc89f8
SHA256bf5f2cb487099fa2c4e19ec38ecab18bf1484893829638d5edcbec2e3791fdee
SHA512a62f67f9877a3d51703a2da755ba56bb02eb5de3335c9469956d12a4965ea9e48f13bff9bc1bafa29765e1fc040414dd8e568651a378419dd3358b3295688b46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5777a0ca863625d9baf37d844cebf601d
SHA1794fb90535ebf75ca79dc877e496d6067d563bc6
SHA256aec2b9538ad3e074af347a97e52af15c729c6a9873a4108d2d5258617eaafd65
SHA5122a3c14bf6a867cae29f785d7355616f0d1358de3b072e45898da3c5fc0d4153cb340752ff1cab8e3454870fd8bb42625d500b3a00166e70a2d2b1d8209d764c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cc0e2dc5cde4d210280f80ed82c39de8
SHA186d2fe6e12b11f13d9efc0ec96351bff544ed9dc
SHA256f0b218dfc60e150b9567673706f02d99ca84b5d60057a94e1431bab17cb0d42e
SHA512fd884c3892c3b4704d4fa91e946995a597a474e9347c22bd5701889f3e37ad9da391a018f1328e1b092fb67a9b8ab844fb9eef3d13343553d12461551729ee8a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b