Analysis
-
max time kernel
133s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
a498a8bcf831737dcf3ff1f5e9e3882b_JaffaCakes118.html
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a498a8bcf831737dcf3ff1f5e9e3882b_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a498a8bcf831737dcf3ff1f5e9e3882b_JaffaCakes118.html
-
Size
4KB
-
MD5
a498a8bcf831737dcf3ff1f5e9e3882b
-
SHA1
9834f51871bce5360d7e7dd2a69cab67d90a43bf
-
SHA256
f706d900828744fc3c85cb180cff0a90fc0178c1e6d2fe8553b65fec6e69694b
-
SHA512
2108405e93d3c6857637448248b9c4a9808e2913014ce25368d8572a3472eea2bf7d8aaa739755e50e3359f41ec9ef3f45bc9b55da8cb2dd610295f552c547e7
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oECaWKd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDh
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424428644" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 708053806abdda01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000087f49e8ddd7ecc48aa8afa6bc093cf8e00000000020000000000106600000001000020000000e391e0f1d3cb977535152d869bebcf575f923c2c53d4eb087d0db9703284eab6000000000e800000000200002000000089c9079b506e65efb29fb857886c033fef8743e43378e81ceeaa0d64482068532000000035125be7af9eea045d07be42d52b75f048ad2ca62fb1c90b3ab395ed0642e54940000000aa1cb4a98104b070ff964972d13335ee70d129216993892c9ff3b7ce6dc7a9870aa1ad2e80a054b9ed5b77dd46966c8af33e10731017f24b3b2684d85dd1db23 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{ABD800E1-295D-11EF-8554-DE288D05BF47} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1724 iexplore.exe 1724 iexplore.exe 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE 2260 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2260 1724 iexplore.exe 28 PID 1724 wrote to memory of 2260 1724 iexplore.exe 28 PID 1724 wrote to memory of 2260 1724 iexplore.exe 28 PID 1724 wrote to memory of 2260 1724 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a498a8bcf831737dcf3ff1f5e9e3882b_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588fb14afdc2984fc2f10cc43b833bd1d
SHA1b925ace5e1aa930c51391ecc582d8bd5351aa7aa
SHA256f7fd1496c408363382136620d83f72e1933b5355b56b213bfb8da9d9cc943cc8
SHA5124d071eb298ea507457dff9f1c9627149b3c23de3d0182f98980bb1fd2500d42173c8f8207f7784a35d35139a1206338a821a7100ae5bf6a2124ff7e9dd457bf0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5553d641461658cd8d3ca8ac54a00779a
SHA11f45675e85b17307dc7d7fd6be09cec6d3f35d28
SHA256f1aef08ffeb365aa1b703d4d76f9329dca8736d477a6b94e9b2a7254b7cc4196
SHA5126d661185b50f59ce44f50b89815ab567763326e6a60ba12ae1e585a8c495e07dba33e92a28252e76f3f5b7647d46122a32cc3e552c86b5ca6ba2087773ae4ea7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f512b51dd543d45633065589d19721fd
SHA1651c792b9e0b67099e677cd4c953a3493b8d3781
SHA2567ad4741996b75686c395d23cf375240e3dd6eb61345f91135e0a0268f72c8ab8
SHA512558ab25dc4f61bd4989cbf71fe0a0231e63b8cb5b9cbf9faf57b174ba631a7092376b67ec8ef0ee820eac52b369c3bd1947d6cc8fdc896f8469b122f061eb36d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dbec3e7665df569b0a3172b16860653
SHA1517a678ea46fff3372f8ac86ba141a1927e0648c
SHA2560c6bed60ea25959134e4d535589ff125ef1b0d8971808e14cade2bb04568808b
SHA5122f994d679805861dc62bc07dc3c8927639db626e34638ecce374aa49774fd01967cd2b7130887d7fc3122e1c279bbe86c0539cb7d0bdffd96d47d23476afb795
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD558ddc99a7de50d08d2b6bad382e7d46f
SHA1d7d0df7be92ff39f3a6e910f7f8b66154926f706
SHA25667d6ad874262e920729698fcd52597048dc07e60f670456ecee387f96afa044f
SHA5123b65fef2fe442fe0d8c833814b89de6a4888488abc6030aafac1fdd9691764abf42c25909f2f83521c2ab2368980b2acb1e4b983dca95654024c018f83eea695
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD586c64558a4407369fe06b7d7118fb589
SHA1cc8a0770aa2fda742ab9f77a74a38dbdaa85b9ab
SHA2560ad0757ee36c2e3a0c60d5be504c4094fdbd0bac8c137bdefb96eeec81308ec1
SHA51236938fe52e313982d002ebd249972edfdfcb50082788f88286cd7fdc068fbeb4e56d3b16a984c8f319de2fc688113258e1dc868e57851f3dcbd1950d23bb7e46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53fb867a78b7d4633831153b4f2bf0ca2
SHA1d8860e3fc4119e158bc9b1840b2c8cfae25a2114
SHA256eaff968352989b8a133bb3341ae9d3d16f63568837d4561205249a9807c33f2f
SHA512f101cd2341e26b4e1e3fad36e0c305a9286a3660f22241a5b74fad8d5669b3b9cd411e300d98453de9f8b4b4cdbc898fbb086565942392279ce3a038cdea4e19
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee53545465b6e64be6116d4357355733
SHA1638ad5c97351cedd40eeff040605d13af771f9d9
SHA256672a892ad3d0a7065de626f9baac7e6ce1ecb553bef0e1b575d845e01a6646d4
SHA512343befa4ad8d4292a5f3d4a9d82bfbfc5b7a991e32cb0d5bedeb5ac030d31ab553b86d3f3c24d5f0ca38c859b79bb493e1ea91f2c035149707066271f2d06a32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53e8c348b89fc24289c357033bc769b21
SHA17d0871621095f2840af07a2d7615ffac93e95664
SHA2565b6b70280d7cd423e575b2b0ea2b71a9b432649eb700facac08b47cb45a9dc22
SHA5121ed9d70487d9ddc274c6d0ba6a17d4d48b3a110de40e9879663d60750b7ba387e60b61d0ef440772cd4beb78e80a8ec040cb86a7b121df629a0275bec1ac03a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ac8b3c3dec416b0279df20c8939fcedc
SHA1d80ec0084d464183e663f45b8690e62c9d14d888
SHA25675c77e0255143ce8e4ef588517454c2c05957c85f1c826b1ef4994fc44473ecb
SHA51257e95f6b446155b3bec1b599560ac019ff324b7b6854a0b3240909b465a95b6a242b5cdd01c51b40ac479c539d667a541242dcc003b28a038a85f6b4dd0a3fd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594be3704f09eef7b682ce98699184e58
SHA1283af574f01e4fd74e6e0b25cca4660887a14183
SHA256ad40e0fca3f40efd164328917ad389e82dc2830cb6734cab18392b29db977952
SHA512c26ec1044e7400c97ff3923efd0ff4bca254b07e60a0c689093fbd1aedeb21e22dad2213e74a7b9e370a5c7920f08a2f24c16f262794ba7c781b5f54246e596b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595edb406fe3780065585984e22159b57
SHA1c623f0ead5ad1e57bb5c8f0746730b82c36b303e
SHA256552613fb8d1547c7a16ec633230f0b6f15145975bd6891735e1b11792312938b
SHA51272bbbbccddfe1735a19971a2c5790540557e972af3f42b9bf176d2bf71629fa9d63b3dce11f41152736b64dda14d3373423488bb7b812b5f543d44d57faad643
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517053b422d8386d9ff08aa9af581e18a
SHA10bb2a15c234d2a614ed40c4946673706ac577754
SHA25689d681ed47b8e2e4f601e21734061b9f800af6c0dc14db482415c428f81a743a
SHA512da987d572e13bc2a2a811e69aec72edc5fc94cc1ba609cca06037151925e8d0275aa141f635849afe92b7e18868820beef6f1c148a1b38e62ddd754b54ff5a40
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53a37c6e202a3ad54dea6c1287ebe4ec3
SHA1901861d68fc9fe72321fd940a32f21d91556c2b2
SHA2561c7c5b8d08918f134f109d37ab8255e03d95ea0e2ab7d6c1cb326c27b00dff82
SHA5123794ab718d629d444ef48c4ec3f9ae78f70df4f3abc195842b5dd455336cb3a6e34daaf9125181948537f17360f828ba0556de90b44bd69c05b2128b51c9894c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecb7588e4936de05710ba3b95981ef23
SHA10cc554fbef388ec142cc8707e72d459808010a45
SHA2567f0649d253cfa7f02bdfa015743d675c577a2aa3a5c8f7fbd8c898bccefd9b3f
SHA51297a36393d1a59ca60f5d3ae6fbee6505261872d53c3c75f92b534843d27e20d8db3f49c9845cbefeb4be5b778e6d88ddd419be195d010a0a9e6f168fa559ca62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD525cb13f190694cfd14e7d90dac0b53ae
SHA125aff90d2387dbd86ddb9e13320f31857d11d96c
SHA256f2aafb6fabbe330a2c0df4a515a2d721b6be76f1426f6fe99bcf9c15e0d5d524
SHA512201c5d29478ca49d178fdcecbad7496c1f9b9c38a6f3717eab97d5b1dc974203b9d77570a57f2d1b9bfc8afbde9b5f9d32a2e718da1b7917c13917df92441b62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c3accbcf0b793fdb57815211a573b8b8
SHA12a53247d8b1d8843e4c7d43e7765e6f1b9516a08
SHA256df20cdd756a96d6e76b2de0995bbfa401de8c39b637cc3ed2cbf718b1e055afb
SHA5128ee5a491eac839ec0d945408e93e4383a53d2fb1fa488310496a34f919b0a17a0b127835bac7c5a84c1b2cf18ddcabab8d72b924c8323615601f20cc008d7905
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599f5eab9f475191578540119f45b86e1
SHA172e6539a3456ca2ad55cba1be4254935f49015b2
SHA25606f61f872c7e66bcc7f8bd700f1605e0d5c5b7f6a58d45d006dabe19c2d1c491
SHA512a0abbfef1c8d68dd6d91155fb10e7a0ab1476d74ff861e164de4e8449a8229bc055a518e0b519a09842cb4ad6a9e9017fb5821282a363a781dc5155e17fb9660
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518a20535ce0ed4346854bc50fa4a2fb8
SHA1f8a32af02be9528ce31bb694604f8e94b39947f5
SHA2565519eeb2957fa8500d0685957da2a6793a96fe4535e25680236ac1eea1a39270
SHA512c94ec7035f6e99bbdb0f067e060e33fb72367406e6fba8077432c0981023a240435b759a586a2768375609747ff51d2a7345eda498b63bef62f0ddbfafceb469
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b