Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
a48ce2ab7786f7549812cd3396b10db4_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a48ce2ab7786f7549812cd3396b10db4_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
a48ce2ab7786f7549812cd3396b10db4_JaffaCakes118.html
-
Size
8KB
-
MD5
a48ce2ab7786f7549812cd3396b10db4
-
SHA1
1f4bf7092d62ba7518294ead3f7204e1d5cb3c81
-
SHA256
6573b41928a2618da24346594a9d3f94e75830a120493f7ae54f8ba5029665d8
-
SHA512
23e053ec891c98accbdd0ecf400954cea198dc1088e0fdcb51031d6a2b14b1364ef03f4f955cf270e40f43bcaf921a9741aa9f7845aea675b44a55a2add01da1
-
SSDEEP
192:jcUcWhACDH3fQLWWArU/u5BMCTeZzgpbXljJC1jtE99:n3YKxU/CBMUeZzkTljJ6jtE99
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424427834" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d8ac9d68bdda01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C90791F1-295B-11EF-93E2-EEF45767FDFF} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000009937ead2a2e27e42aecc87b01b21cfa2000000000200000000001066000000010000200000002079a04d0de3555e1c9985df77b51f03e31865c9c30dfcd295be0fb53ff570de000000000e800000000200002000000021584e41d4999d8fd7a246773f47baca9f3f6dc3f6bb393dc20d55543eb3041720000000b2faac8de36bf970d6a5f1288aee6287cf2df2db78e8a144a1e15d2c2b9799a240000000231e6275e89d36370d1a528ca4f6b87be77537eccae57ffce6d31dd2e751ff344bb149ee86f8f78d17d1db2b3fdfdda21adcce8924ebe70e0dc9eaea0ecfc4e7 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1580 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1580 iexplore.exe 1580 iexplore.exe 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE 2476 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2476 1580 iexplore.exe 28 PID 1580 wrote to memory of 2476 1580 iexplore.exe 28 PID 1580 wrote to memory of 2476 1580 iexplore.exe 28 PID 1580 wrote to memory of 2476 1580 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\a48ce2ab7786f7549812cd3396b10db4_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1580 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc28dd762b0703c88174383dd97c3eb0
SHA1ca328215efb0147687c890131746acf29a9ca062
SHA256143bd9c32cc0c7b73139990a38379d0561240ad92eb4127cb03ba8bc0a2fe94f
SHA512684bf1837ea18249f5430da099ba2929468a218993cd734d25e72ef8c164056e6b1305ddfb00cae63376efe4ec3b3bf88baa1cfbdbca49371f67ffa3e8d7277b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfe4e71a4d96b60b253df11fe6d02054
SHA18cb6914a9f83d8918fe84ce10ac4eed078a76762
SHA256f86cd5fc34234701c01691fb44159bc9654277a0d4897b2dd5a0da5e2636c1e8
SHA51256f74e60ba0cc982b3b17de71572bd1235717467a0f7dc3ec334686103dd4f727a7a8b38ec3a2b6365849d4b9789fee96b12acc76fa498e133fa305f7488b83a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bd992aa594775eb211563a71bcf4a41a
SHA11b3c546b166c2691980d0f1d7ccbdd8c784674f7
SHA256be693298133ba4e89aab6f06c3a13eaf1c37a07af5031b851a530c92cf8d752c
SHA5126db6614650a4a3b02c8f36e1b994ed7e8fca4677daa5d87af870d1040aa24e42de79494a14bb3bb0fa4355ddc891e3482fc2753391967710f6fc3b1bff595cb8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cbb1db30876ba21e37eee41f7adb66c0
SHA14bd9a2e44b2b3bfe36491715ad4ec0dd76682f5e
SHA256c6e6d920dbf2c3b02bc14e8a97b849232737777502198d565e69f13812d0c9d7
SHA5125bb3f077516ed2703293d1f942ea3753e89f06bf29eea5ef234b9e98ceb6bc550ff8b2239ad584a089766d0f94ba545bbf17c88a6f58162e2723c5dce588a360
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6c1bceb57d72155102cfc68259da458
SHA1ae03fcac9ea5da13541df2173d2c449da0c767f1
SHA2568a802fdcc6047db3ca56d269d80aae2ab3df20cefac24d9f479a2f2f98063f1b
SHA5128c3c7765318538c1b81c2ba10e4d2424fa8aa6b166d06204e641253107fb65d2f82dbd742173c7b7b1e15d72ad0a565bd9e9c4faced77e0d41a6c2cc607e5f60
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53d83c107d4691c67bcde56722506d0d3
SHA1ceccfb1fadea3966ae6903d7bcb119ccd4564021
SHA2560a384153f9f5a0cec894776ff1bdf028eb613ab1bcdc937e8af5c711baddb279
SHA5121b9f858e639f29522070660ce53581b53a383d28e9c5545a67c2ffd3eef58bbfff421d78bf3dc843747f120b3582ead7a339245ee516dcb2df54fd744caa6520
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5900f33cd76f3dfc12e2e2949b5610380
SHA13f9f54b92f174542dfadb6e039aaad15410be830
SHA2568239a50aa4ceb68591e923a9058f90b3cc4ce52d326e64ec9269b576e2c6e73c
SHA512147efb88a7f63c0aa6e58edaac423486104b35fb8199af76c8c4f298a99923e43455258b7a73fcb950b339ab2fa2b0c5ab515686674dde9e9756ad79bb45e31c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58cdcba9f3b368139ce4f852a059aa56e
SHA12e10cb0f35a52ced6126f5e00c79fecddba4a265
SHA25691e52dc8f1a0a17bbefdd8d9e5438679c6e209c46bdffdad1620fd74431e0007
SHA5129a45e6ac5a3b9b408dbd1951c62dd47dbce92157ae2bf740ae0be6c2061adf1f777f508fb249f9b07bcab76851e7db240ef76dd45460ecccb7a85f0e0436d157
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500814ad980f713ffbcab58423b510fa2
SHA1525f8903ff77cdc37997f92572db9a361199080c
SHA2565cbc1e0b15f0b24af6f7c1571552b5e0b63f9405a5b74453442dac968fdd45bc
SHA51207ac4025f85cf8405927904344588e57885e236e5784f40ec62fc07d45312f614217d04d0728045f53a70e28a76d1a1b30f36b93e7f3e4807dc6a4e6a1fc5367
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51089cdceb950b73bf681cfc122923cd4
SHA10faf68135cc9c55d6dd8903cb519b5493ae943a7
SHA2566f3bb9ff5a330451ad68812b0e2cd67263d6ead22dcb9e166ee2e6143a874b80
SHA512ed3144874600c7faac6388cbe0c27ffcf13d76f8568ac022cc7ff8722dfd44231b090c7399d23d3925a361bbeb07a9e5b5627d0cf920e962f024750425b74fc0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5727e7524f4e89ba0c8b88239bef4b162
SHA185d75575bbe7fab5fc307ece7ea02a16b7812063
SHA256592829c48cc78a45ecc61dcd7234f303d1daef446edff4c84c41b50b960d78f0
SHA512774c700cb515760f9902188aabd9ee85f52857e498698e35315a6374fcbbd256b4109319d1fa75003da1689bdf7a95604f80bd5aca7a0488ad7c6bb37f98f99a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD567c1dd397c816ef52a6b5a3fdeb39e4a
SHA175ef75b10e46d254e00f2571ce23c8bc42b57ed0
SHA256c0cd9c9a8cf7701c5e34dcc289471daae2ee458524a579a0f8ab040de6407d3d
SHA51263a18185dc1f8b6d5320f5bca83a3214d16f17d1a4c2c58bdc7a302e3d4ab11d90f357c59971c9ae8b4bf8ff2ee7a514b2c4e1500e7824ae149f2b1e011d07f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c7fef660df20882817820758538f332c
SHA11cf5fc1419af165eb51d7bda18c89b175b388918
SHA2560d81e44e9e628aab3e356e23fc54fa08ab90036ac44f3de0cd03f6c1f4fc0b4c
SHA512eb74aa07bc4767d2e5d85045e02fffc297763fc11d1804cb46c59ab1cefb5c838ba8bfa38f31e0f905d62ab3410d6d2d9a6871b7d48c6acc9b74334403f6a330
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD517189b004b439658e8b226e35f1852e6
SHA11bc5fad40bd738c235e7d450c7d195fccf35756f
SHA256d712ab39fa84ca87e2562e85e50e71e49fb5f71f886aaeaca6330907cbec531e
SHA512168aff927e44a482a086e17ba0226fa020f7f4eb9f6e7c78e3769e1ebd9a0e6ef802114ae3f7ba04dfb8c8042f9ceffef6d3511ac748a717953dcf6a1b25cf15
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d969e1bc3671557a97d10ef9111f2255
SHA11befd55506d84caf0da00d6fcd1bb392d7b5fe63
SHA2561d71abb095f14cea8c565ed8fff44f51221c464ba75ffbfd2ed3f7ad4211e451
SHA512cebc5659754d724a787ded2b0080804e4b0c979f306c4ec6b2f699c1411353600adf33bb0869adafe68c2583ad7a597a01c6cf660819b7b1179624c966adaa55
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e1ea0db7a7810d8cb359c7247f88711d
SHA11977e41069bf4d4f700b9305a24c06a97e70a1d0
SHA256940424d9b8f0bb7923f0a71a7328272014bad05ff34977366b22a38cf0313dff
SHA512d566abf126bbdb25b6c07d48e440d854cddab75cc899ce8cbd9dba37eef473cc6b3ea137e8f82fae8ae71b927620aeb0cc5ecf058c3d7a25f508ea0d8bae3b6c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfdbbfd8396293746bfa03a08ea6e310
SHA1fff5e05a6082ecc313a9eacdb66128f3237a92fa
SHA256b30307b64c8a4c50f980fdf699bd2ffb2db1ea0efb1f591b838720e23f10bb7f
SHA51228e6e2ae4404248db68193668be7a45a28e0dbd91291d55c2b3b60cd0ae825f722d90565554e08880b851ed6ea7c98dd928bc0f878409c131c93b110d243897c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59245ce472f36b5543376f473b76660eb
SHA17671c57568a3eaead0c525bcefc53f09a40c27f6
SHA256c73f383205eb31ce1c1bd3e29e96a4b566d18b2a9db1abf92869a6e984bc2f84
SHA512c7a8dc5770448a05dd214d442424d36d65101afb4168f71ffa37c186f5bcd7666ed0d646ad3a87f2c407debbe11806f1771cfb1c0c2436451c1fd6a84527f5c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aada96bda5152e3ae746d33a8b6cb7c8
SHA1798a4c29de8a39cb62d27f166be0c1393e211151
SHA256e70a03c8670b6018846912c59ff6472d271b616f82cc77de6554d280ce19bced
SHA5121bc06f7d3985e9808d0dd1c28fe17d8ead9acbded60f925306e5f321192698bc00a3995d815ff611385dc2e29e2859cb441792077405c0e53da64888b8f348e7
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b