Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
a44dd61f2126e75abb61bdabe8d50e75_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a44dd61f2126e75abb61bdabe8d50e75_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
a44dd61f2126e75abb61bdabe8d50e75_JaffaCakes118.html
-
Size
26KB
-
MD5
a44dd61f2126e75abb61bdabe8d50e75
-
SHA1
b22f193fdb9e85e264428b7529bc67af055b4dcb
-
SHA256
e4bd22415c9642b84a23e35c3f9be37b795c4955f0bd93d3f2f36c5dc4940840
-
SHA512
ef918c16f107c2b9cae0f0fbe2cc15f15d10154881222eeec45d16f2cf46724046a848417b5bbf3098a9d3003cae3e9d54c2731cb6de81ed4c2c428ac3096748
-
SSDEEP
384:DpUOdk7gd+NDDUJnp30fNP92rF2vy2iMzjhKVpTRF/DGLGoifFFBS9kv:DpU5UAk9yyp2vyGoVpf8Go+BQc
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424423603" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d06e9bc35ebdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000600c50015041114e9347ef98a1e64e2c0000000002000000000010660000000100002000000000b54726fa19f80fa484ccbd8ffc14ddb51b5e8f6a898b4c816ec0e3397141e4000000000e80000000020000200000007a3f8fba1e76a73b47f8ffc07f1222aa7ff28be85eb6325cc986d22fdb1279c620000000cabfaddf1f2fe52973eebb4633f25906fa8bdf3671307f7c9ad0448aefc09a8d40000000779d0210834dd228d57ca0d2e4b767ecdf6e55f20af0a4cff3d94bd73ee0ebb6f41db278245051a54e5088451f0cec1a846bdd2ec6c48e01de3ed18ce4b5b9fe iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EF20E941-2951-11EF-9680-DA96D1126947} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2252 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2252 iexplore.exe 2252 iexplore.exe 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE 2520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2520 2252 iexplore.exe 28 PID 2252 wrote to memory of 2520 2252 iexplore.exe 28 PID 2252 wrote to memory of 2520 2252 iexplore.exe 28 PID 2252 wrote to memory of 2520 2252 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a44dd61f2126e75abb61bdabe8d50e75_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59dd5f1b7172721b100a777a42feca677
SHA1fcf0fb92fc1a37ace9562b395bd2e4b6d0d4897b
SHA256623e47d641a53d46f9b72db76d20d5ba59082ceb89bbf84c2b847fb29cff48dd
SHA512af77229dff69d22ebbf1e37cc79431d4f732bdfaddd16dc9c89b7f863f3884c3fc20a1e4f73e19a11c9141586b3c04309f64ff473d0cde9ec862134c92f96759
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51a66f80f1a531585561f1576452767a7
SHA19d21db6a85876e5cf9c8eb45c29291ff2ec7f336
SHA2560005e31ef9485da9828632a6356b5f09522104ceccccdf3796205b2086c0abac
SHA512742a3662bfd05f5e638c9aa4eac04a1b3b42d95807d4b2895d9421906f9f31725ab5efabc241f60ddbed6db422b20af9d10c46074beeccb8f857fcf8d94dbac3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561c3c2f5612579ef3f20104b2d867653
SHA1b4262403787f7a701265ffb8ff904ba715eabc92
SHA256c2e1e9331471807763a3c62387213be044f759d39fd6f72a3add47cf22cffac3
SHA512a10dbca3edb9c53446bbe8b3c3cc3d3551ad3505129402dc38a980ff9058679567fff565fcfd9d310f0b78c917f7588010e7158a5aa0e04f7b6b398419425f3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c91dfdfe6e0328cc489c90c7bcfffd5
SHA19057cf38495a3fed6a27f9609e827201628c5e5a
SHA2565f21392555ce63c3df59ba6e3738a4ac43d4ea6de5a02ccb60b8defd6fd1e8a4
SHA512353395618b8167405082d4b07271e1de350982deb214add3e9087b5da897de204c7640b6ea2b0ac76c937a34b378673ff0f8c22fcd0e956c2c6ed08965fd7d59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ffc1000728c44b476019527e084310fd
SHA1a1b23d3ebeb4b96a7cfee0b53910bd1a615345dd
SHA2569af9e1190305f40fbdfaf34467a0d2a52e1851c8247dbb1bf40b8856762770c4
SHA5128739a757c96289e64135323aafa8160f4106ce440208bcd3238198e7191faeef12475cfde9daf41cf58870d2e170543fb40e25991abda6222b94827a037008eb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5451fd98d2ff4fd011e5c8284a307c90d
SHA19dc65427df16ad2fcf554d2451a4a3f8292215de
SHA256589209d496c0caf20cac3c64e0f1b5aad98a184ead2ef3f04cbb69ed69b82913
SHA512df325e3d18227e027a0773dba53477ca5741f0b782c1531d7f0f3c1712c6d02cfde8c133a1e9ac2d245e68e9412075b33a60f5abbc507aad092de78c18d88d42
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD509148e26ddc31ad250761e16728c51ff
SHA1d18b60dd9d139a6c68c99c0fbbf6123f72948fcb
SHA2561cb0faa35ee0572dd63eb2517e6a0957b2068d47a72f8f7a27c73f8c442b063e
SHA5127807a37768504b143816044b8e1d044f871b1e3916b0aee830eb998921b0cd0d603b167edbf7caffb2fbc1f3bfc8bb67cf1acc3bfe6fd069b99909c3a2352bad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD513fdaa6341882e2d83143ea3119f8033
SHA17a3b997d4fbcd066d0274c572c45b8eaa5cf26d3
SHA256c6ac963c1dfe54cddea1aece703598c31c4a65d9df6405f8b81dd1daf15a7524
SHA5123b492747b8b76c88188b73b5ceb5232eec1ff0c690e71e9d8c4c046aba907ef914245ae1394a5f1fe91fbfa3a3eacd49b3d983a07168306b1bc56dfe131f663a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b97fc2720f880581a42cfa335108eeb9
SHA1ca830a258af4dbd8a3159248787a2e8470c973a1
SHA256e70147745075bf7449e3aaaa13f9ffaf8f8edb1b76e547dd89fe94eb8ceb4972
SHA51288470a6b89f7418537e4fadfcd34bbe6b73c18c2d8ab108dc1a06cd130a1f59410115bb31aa1597fc92fe30a0b63bce9942b9bf7f62c6129e0dbf1975375d602
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d59fcd9155fbbcc23e8fea5e2c1cc6f5
SHA1ff21e47a26b51e218ee1f0487d12d21e8e051289
SHA256efbaa848bd8f86c7bed6c57b153c99e59575fa78f5b04407165cde994ccf0367
SHA5120e3894d4f053680a3fd94b32700ce79e9dd5a40ff498159b6e20eb189dc517349e1694e82df72d731fb32789c036f4ccbdb84e5bba6a1261f58db8c898f17ab3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53082787c0202b1b7db04a220c36e7f40
SHA15647fbf8879c63592742183d831340cc9e640244
SHA2563229034a181168ef5ee677a63846a4f187266370d6b78c7b5ab3967cbe13dd55
SHA5121e1f8d17a27541821bb2febfc780d06484b49e56ce2a3a5200d44fd732ce5128f499db295379d4a99593e299bba94dc1ceaa6e3bb5aecef834ed5872740040fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5263b17d74415c99099fabbeaf1a7fd4e
SHA19c6daa5ce108cfccd0eb274bbdd6cf2e91f9dc37
SHA2562e3f658b40389bb9c000f01629256471438393a920485f219d538060ae2e2b5e
SHA512338811b0650b4c33420198ced13eb2cff81f76594a5a30ef3bb3d26b267d888f489da17259d783adf20f28176761dd79613faffaea5946b610ad374ac0ff870d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d82e4f6aeab446c39eb1952eac632df1
SHA1e809b04112da6eba87f5038c4e032e6f2687c9f0
SHA25671c09355639bd3b88cdb14a0a364436527e2d521e099196faeef89873b9420d5
SHA51270c0784d2fc1a86d7210755d2ccd36fafa6d47278c1c3861729a2a9acbf15099db242af3b92a7bfc59b1e834c6f2a8889d649dbd102f36d4a10249ed9b64fea0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a47beafb3f5f86324fe240c037f70bb
SHA1ad64ef14aceb4cc91f02008d3fd26672bf213d6d
SHA256b4999d99f7fd20333de1f9720e39c9338ac9f58b853c79c837d27a61ead48f7f
SHA5126eafe809a06a7887cee98674bd02bb1bb07c0fff96b6601033c698a637d0d8a7a9ffd99a3229e8ef51c2710e625553ef91bdb2cb5f81c9f9f1830cd402d9507a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538707a9fb86eaeabba5fabc5d8ffdb52
SHA108e54677e20b5e08c2f9a46d9db379e636f8185a
SHA2560542d461d48ee12a218076b4fd572f138ea1e26cc1850691923e7d96b37252fd
SHA5120887c785b08ef49394f84f3164eb9817205a0e65910376d6589b767b1f32449e8916b4ad9881ab063e7b73ba8cee1eeccef9bd0310ae8293ecac32f37ad5a2b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aba465f402eb4f981f6aaffa86b2b7f9
SHA1a2b2270030b9460bc7d8cfe1a3fd2ed5f5e52cc4
SHA256751fa642ecb976c806d823705439e55d46836fdd1d126848d52a93040e7617f3
SHA512b283a0d75949a23199df6050ee25be02e351469a18760975a0030a0a153f4cbd434bdc8aef8b39c5cdffa9974e723fb3ffe76d321c4c75756365259d54389fbc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df261bd5a20ec13604589a3b79acd919
SHA1596a57bc93551f22722bfdbf1dd842a72d570030
SHA2561bd4bad4fe6260effa53c24f92063f72cdc6d1d8e69734ea70a19378157796d0
SHA512d0110f08f791bcf429a98a2ea2374796a39be9aebcd5532dd37bb48fd5206b26444755dba5094065dc5f8856b5a6b9d9c0a00818bdafcd73d002eea080a0fb6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daaa8d6087dff399d780c6c9f4c21d3d
SHA1d2bd07cbf13f1a79e241b15510835df874f47644
SHA25628c2071b8067a2421c23746ad6a21d4f5a74886457a7bcd338c938e0956e928a
SHA5128bcd648d4ab488fa9f6d32f1e73d08cc193c86a166fcc78e77b72962c172a96a22e09324207f833b9b7ba0b404319a2e4a058ba6f914a8d9d3b55a6e9fe5df93
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5092d5d270480a259400d8fbfbb85178a
SHA1e4b727cfea6920a23bc522a043904b0a5389743e
SHA256cd9e7aafa32dbe84f36b5856f5bc1db5dd0875220be314315b8b812e3baa31e1
SHA5125bf7c64bed2fd9f812178e636e892ce3c3ac32b78da967134e9dc0c35819acf82740aab007938bdb735c540f31bae40a388077c77ded0c3578a0105836593bab
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b